syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='uid_map\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="1c000000fd5834a34da6a7f4fca9701359d0e981ead1bb03e767cec802f88e538c11579d9c45e888a06af98286a33362c3074a4a6e757c6de6a484812d135a98025a4e38a4f31f9e1e7e2ee9eb91b12ec079e4e8658f1bccc72c9c9724e0f1437e20b595239f1d7393e7ef02426e8e805ee2e18788ccabc0830b712547c9b138583567aaf843fb9972371f7dc51b627930be3d0891ddca2acbd0beff26cb9cadda02b997d1976cb024c777", @ANYRES16=0x0, @ANYRES32=0x0], 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x40000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) ftruncate(0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r1, 0x800, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000580)) fstat(r1, &(0x7f0000000600)) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000680)={{}, {}, [{}, {}], {0x4, 0x2}, [{}, {0x8, 0x1}], {0x10, 0x4}, {0x20, 0x4}}, 0x44, 0x3) sendfile(r1, r2, 0x0, 0x100000001) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0)