perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0x31b) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={[0x8001]}, 0x8, 0x100000) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x26, 0x0, 0x1000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x14, 0x0, 0xb0b}, 0x14}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', r1, &(0x7f0000000140)='./file1\x00', 0x2)