r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000009c0), 0x40000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000a00)={0x0, r1, 0x0, 0xfffffffffffff000, 0x10000, 0x3f}) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440), 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x200c, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) clone3(&(0x7f0000000740)={0x40, &(0x7f0000000480)=0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000500), {0x34}, &(0x7f0000000540)=""/201, 0xc9, &(0x7f0000000640)=""/144, &(0x7f0000000700)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2}, 0x58) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000007c0)={0xfffffffd, 0x81, 0x667, 0x3f, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) lseek(r3, 0x1043, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000980)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000940)={&(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x4004841}, 0x40000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00'})