fallocate(0xffffffffffffffff, 0x10, 0x3, 0x4) r0 = socket$netlink(0x10, 0x3, 0x2) close_range(r0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000540)=ANY=[@ANYRES64=0x0, @ANYBLOB="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"]) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x20100, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000020c0)={{r2, 0x3f, 0xfffffffffffffffb, 0x6, 0x9, 0x7fff, 0x2, 0x3ff, 0x100, 0x401, 0x1, 0xfffffffffffffffa, 0x5, 0x1, 0xff}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/cgroup.procs/file0\x00', 0x900, 0x0) setsockopt$inet6_int(r3, 0x29, 0xb4017a8758487d15, 0x0, 0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x2f, 0x2, 0x6a, 0x101, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x0, 0x61, 0x6}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {0xbfe2}}, './cgroup/cgroup.procs/file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000000180)=ANY=[@ANYBLOB="010000f3ffffffffffffff00", @ANYRES32=r0, @ANYBLOB="c46373e9"]) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r6, r4, 0x0, 0x80464c453f)