r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0xa6219d3}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@updsa={0x17c, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {0x0, 0x800}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x4e21, 0x4e22, @in6=@rand_addr=' \x01\x00'}}]}, 0x17c}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696c6530004f3373c2f9c62dd629892577ceb0da43aa021b9f067f2c0d1cf013c370092fc4b673b3f47e686d7095f4f90732ad48aa233aaf89ea32"]) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) write$binfmt_script(r3, &(0x7f0000000580)={'#! ', './file0', [{0x20, '#\xd9:'}, {0x20, 'trusted.overlay.redirect\x00'}, {0x20, '\x00'}], 0xa, "62a7ec04aa65f7f22a8d5734f016d3e31c890b8aabcc7f8973fdceff4590864a2d8d9e6a89681ed2e5d88c5baad64e1cda855aecf80c9e217646c765a87135cddb1b941d8ce04478f095e7f4de5323d694b94433c369716187e022f8bef64b92532a11815705af6230bcf201a541e2d84e67b68111f00d7d47f2e38562ce4f80365fa454a5911cb84141175bf89a90808a6d76f8a3e59d2ceaf6c107a1c10767b1e374b0a426618e23a645c09c4469ee169d2e63627dc403940c1caede71801cedc4e1e56dde8313ee771bd24282265f92913a074561b40344726ce80128d24c928914a07288d3517fba78744c"}, 0x118) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000c00000000000000000007000000c4040701000000001c000000000000aced9c6d5e833b8700d45d6783649c42", @ANYRES32], 0x38}}], 0x1, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000280), 0xffffffffffffffff) ppoll(&(0x7f0000000100)=[{}, {0xffffffffffffffff, 0x3340}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x2490}, {0xffffffffffffffff, 0x11008}], 0x5, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x5]}, 0x8)