sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x80) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, 0x0, 0x24040101) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0}, 0x40000) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200), &(0x7f0000000240)=@v2={0x2000000, [{0x363e, 0x5}, {0x26b, 0xbcd3}]}, 0x14, 0x2) mount$9p_tcp(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d7463f02c706f3ed6a5a794ad95842b98dd491f4872033d3078303130b8cc7fe8bc3030303071a66ac288af69da2c4853e15349805af3865981dc94bae4d8432be1169063b129bd6e13394978000000000000"]) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x11, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xffe3) r3 = openat(r0, &(0x7f0000000100)='./file1\x00', 0xcc223, 0x5d) lseek(r3, 0x800, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340), &(0x7f0000000380)={'L+', 0x4}, 0x16, 0x3)