r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw6\x00') pread64(0xffffffffffffffff, &(0x7f0000003100)=""/4096, 0x1000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='uid_map\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) read(0xffffffffffffffff, &(0x7f0000002880)=""/196, 0xc4) fcntl$getflags(r1, 0x8) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)={'L-', 0x1}, 0x16, 0x3) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00400a000000ad002e2f66696c653100"]) sendmsg$NL80211_CMD_GET_SURVEY(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x404c000}, 0x20000881) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw6\x00') pread64(r3, &(0x7f0000002100)=""/4083, 0xff3, 0x20000000000000) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0)