sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x80) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='uid_map\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="1c000000fd5834a34da6a7f4fca9701359d0e981ead1bb03e767cec802f88e538c11579d9c45e888a06af98286a33362c3074a4a6e757c6de6a484812d135a98025a4e38a4f31f9e1e7e2ee9eb91b12ec079e4e8658f1bccc72c9c9724e0f1437e20b595239f1d7393e7ef02426e8e805ee2e18788ccabc0830b712547c9b138583567aaf843fb9972371f7dc51b627930be3d0891ddca2acbd0beff26cb9cadda02b997d1976cb024c7773354", @ANYRES16=0x0, @ANYBLOB="081000579c99e2c264ae08d1143cd97f4b0c5200000000070000000000000800030078fa6595c76798ce1c9561a7a097e95b043e32df637cadbfc665d42cca2597e800e599db2533e32912b7c4ecc962cec2e5c437733c422d3ed18e57e07faf995ee91965545351708cc21e9a26677c2b1eac4fc8addde7ae9cd03ed46da81d60766500009c497a174274caf0fddca3e08280f3634d93ed1c9cfe11f8887997b592a81532ecd93786acbf07a5a0c8e73d13ff14b43340bf8cd9bf72d3ae27a0f276c9963591ef6d8b581c766a33c30fe2a42ee5b88371783e31add165f38b37865b8754a81da7a188e2bfac23fe94ed09cc5c56f17c31cb4bad153fd6ee4c00d14189095309cce924600e79b3bcb611ec0128b09c2c126a354f78b8454447f187425c4f801af377144d58415c275e245010ff719e9192d65993da2cd4ecadf9d9181e917b201c661c0b9d99afbaf7fe32f9e2e6ef8be2d113c0ece1c0c34040782378784c0000000000e4748d1f7374799570c2153d4ec09eff6cbdb874fd632e58a64ccaf2583f066587fef817468354a4790542712cdabfe15e487f5038303a05b89f55c64b110bc8e8ec03e8053ff893d8338ebd733d2c7c26b2e8a9a02fc4100162d37556491ce9a821e05ec11909d36b4d0df54fe075eea08f52e6cd80af919fc8c64435c14d8a7d9176ad03762cba498aa93520f69d04021b06b6cf48f32740e7178739d663a59f75b93aed352e9e8d21251eb32f22c4297c27d88c687af01f9809786b04275a3df261f6c235934d91c27322d0adff80e3c9ca64fe84369ef4c3f7badc980d1f16c7189e9996008a4f7002f17e114cf05ceafb0d0886a732fb28d3a6f232758ba3984776cc36e524eaff61a90e65b4b2618c1c92d90bd5aadcda983ab642e087a871da060eda263f2e40eb2d22018610f1a0bf1a0ab7221a745e0512458d1e4f24356f493b4c8de6c8ad15a84bf9", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0}, 0x40000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) ftruncate(0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r2, 0x800, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000580)) fstat(r2, &(0x7f0000000600)) sendfile(r2, r3, 0x0, 0x100000001) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x0, 0x3f, 0x48, 0x0, 0x5, 0x1021, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x3, 0x5}, 0x28c0, 0x9, 0x40, 0x0, 0x3ff8, 0xfffffbd1, 0xfffd, 0x0, 0xfffffffd, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r3, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0)