sendmsg$NL80211_CMD_RELOAD_REGDB(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x1}, 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_NOACK_MAP(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004880}, 0x44811) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') readv(r0, &(0x7f0000003700)=[{&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f00000014c0)=""/160, 0xa0}, {&(0x7f0000001640)=""/256, 0x100}, {&(0x7f0000003640)=""/128, 0x80}, {&(0x7f0000000080)=""/51, 0x33}], 0x7) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) lseek(r0, 0x27b, 0x2) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000000)={0x7, 0x8, 0x2, 0x2, 0x2, [0x9, 0x6, 0x0, 0x101]}) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b904, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x200, 0x8001}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000000c0)="fe", 0x1, 0x0) socket$netlink(0x10, 0x3, 0xc) fadvise64(r2, 0x1, 0x1, 0x4) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001900)={0x53, 0xfffffffffffffffc, 0x3, 0xfa, @scatter={0x4, 0x0, &(0x7f0000001580)=[{&(0x7f0000000340)=""/44, 0x2c}, {&(0x7f0000000440)=""/55, 0x37}, {&(0x7f0000001740)=""/208, 0xd0}, {&(0x7f0000000480)=""/19, 0x13}]}, &(0x7f00000015c0)="49b9cb", &(0x7f0000001840)=""/121, 0xfffff001, 0x4, 0xffffffffffffffff, &(0x7f00000018c0)}) write$binfmt_elf64(r1, &(0x7f0000001980)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x1, 0x2, 0x9e, 0xf, 0x3, 0x3e, 0x2, 0x395, 0x40, 0x392, 0x2, 0xb3, 0x38, 0x1, 0x9, 0x3, 0x4}, [{0x7, 0x4, 0x80, 0x0, 0x4bdb, 0x800, 0x5, 0xfffffffffffffe00}, {0x7, 0x4, 0x2, 0x7a95, 0x7f80000, 0x3, 0x80000000, 0x4c}], "d91d575b3bce4ee780b4e22e313274e6476852cc7b1ad6151fc9bd2556d55c500cd427c7b42d3edb1e8689f9777f3805a6a182774389c01cdac304ac0ee75454098aad1a24a58dad99dcc9c97a42d92de34e98f7b592fcf4909a3bfe8f4ac884297b86538d689fb744e1e37f4757d0d2848749"}, 0x123) openat$snapshot(0xffffffffffffff9c, &(0x7f0000001f80), 0x123001, 0x0)