sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x8044891) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10f6e2, 0x26) ftruncate(r0, 0x1000004) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x4102, 0x78) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000004c0)={0x0, @aes256, 0x0, @desc1}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x91) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000540)={'veth0_to_hsr\x00', {0x2, 0x0, @private}}) syz_open_dev$evdev(&(0x7f0000000100), 0x8000, 0x6000) sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x80, 0x40}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}]}, 0x40}}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000700)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1d, 0x4, 0x3, 0xffffffffffffffa1, 0x2, 0x6, 0x1, 0x221, 0x38, 0x27d, 0x1d80, 0x6b40, 0x20, 0x1, 0x800, 0x925, 0x4}, [{0x3, 0x8001, 0x0, 0x9cc, 0x40, 0x3, 0x100, 0x800}], "8facddb2b12d286d228a3edd3739aca1d0398dcd4b35e157959ea596ec79a7f3c4b0f30045254682151aeb0831ff956118d6c49a12e7076a6ffe05747b6f17e906a840c04e77a32efb220828031c916d663c2119c9d404f4b38e6f8a599a23f2af858f3fa9d5147e7e2cd8237a459bc832eedf2c90680d4dec5a1b1e9fe9e5e2647b120f17349aff9a79573fc3bbe0f7429cfaa679ef9489a6b9ff1d4e4c42fe68ed8a4641cafb2df0a56adc46b9c3a6915353025a08ce8729a4a6abad3ed4a07e2eaec05fcc140b", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x820) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) lseek(r2, 0x0, 0x2) copy_file_range(r0, 0x0, r2, 0x0, 0x200f5f4, 0x0)