r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000017c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="47b894f90ba1024923ce7053b9b4ffe5db34a4b2b7353135db0f2b2cbce46aaa25a86783af2aa828d3f2205912fab50e8be5c71d481ae64880e0e495786e6c48ff5b8b0995dd45575cf64502ff652387161770965941a42d024257e1aa42011e9d4b38157dacb70ec1f355b1199bc6520c683b710662cebfd26a9bede2528576c985d7d64d8aa189c73a3ba109cdbb6c1245851597d8f9543a249d0600cbf255605bc852bc97b91f72d0a11795b94f5ef3c483f20997041729e57a7e1a7096412b76f61e9f0460d2999b20a3eb055401d470df5a2d714d910d83a29cee0ae3e8b6"], 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x105142, 0x40) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x54000, 0x20) r4 = fsopen(0x0, 0x0) sendfile(0xffffffffffffffff, r4, &(0x7f0000000140)=0x8001, 0x1d87) copy_file_range(r2, 0x0, r1, 0x0, 0x10001, 0x0) r5 = accept(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r5, &(0x7f00000001c0)=0x88, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x20d315)