r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) execveat(r0, 0x0, &(0x7f00000003c0)=[0x0, &(0x7f0000000300)='security.capabilit\x84\x00', &(0x7f0000000340)='security.capabulity\x00', 0x0], &(0x7f0000000440), 0x1000) ftruncate(r0, 0x1000003) preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000b80)=""/145, 0x91}, {&(0x7f0000000b00)=""/108, 0x6c}], 0x3, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x24004850) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x200, 0x4a) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0xb2, 0xd34, 0x1, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r2) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)={0x40, r3, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000804}, 0x8000) r4 = syz_io_uring_complete(0x0) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f0000000440)={{0x1, 0x1, 0x18, r5, {0xffff}}, './file0\x00'}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f00000008c0)=@v3={0x3000000, [{}, {0x1ff, 0x7f}]}, 0x18, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000240)=""/12) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef)