r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='uid_map\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x40000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2000, 0x21) ftruncate(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r2, 0x800, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)) fstat(r2, &(0x7f0000000600)) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000680)={{}, {}, [{}, {}], {0x4, 0x2}, [{}, {0x8, 0x1}], {0x10, 0x4}, {0x20, 0x4}}, 0x44, 0x3) sendfile(r2, r3, 0x0, 0x100000001) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x488040, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f00000000c0)={0x7, 0x8, 0x9, 0x400, 0xef2, 0x6})