r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001780)=""/251, 0xfb}, {&(0x7f0000001500)=""/102, 0x66}, {&(0x7f0000001900)=""/130, 0x82}, {&(0x7f00000019c0)=""/95, 0x5f}], 0x4) readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) readv(0xffffffffffffffff, &(0x7f0000000340), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r2, 0x6801, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000001a40)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r3, &(0x7f0000000380)=""/215, 0xd7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x10001) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) fsetxattr$security_selinux(r4, &(0x7f0000000240), &(0x7f00000002c0)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a, 0x6a4e5309ea842515) write$P9_RXATTRCREATE(r2, &(0x7f0000000340)={0x7, 0x21, 0x2}, 0x7) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x20103, 0x0) mkdir(&(0x7f0000000300)='./file0/../file0\x00', 0x141) unshare(0x48020200)