sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x40000) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2982c2, 0x27) fallocate(r1, 0x0, 0x0, 0x1000002) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) sendto(0xffffffffffffffff, &(0x7f0000000300)="429317f11ed517fa6211b62b54bddb117eb2031018cbb49e334f8fee88e02c961f9e5067342ad4fb514cc86800ff58ec4c8f316ea176b4ab39df999f1fefea8fd5172bbe35c82ed58201ccae9bdbd3f00d53865af41286309c51498a167f2d0ecabf73bae501bbfcf42475d54e52408c3f84115246c6066d752f2f1673ac803a9f64cc5b6f9eaa8b6eb47d61cca70227b047fd403f3fab19f60ff4f4fe73f29b398a7f", 0xa3, 0x4040085, &(0x7f00000003c0)=@qipcrtr={0x2a, 0x2, 0x3fff}, 0x80) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000500)={{{@in=@private, @in=@private}}, {{@in=@loopback}, 0x0, @in6=@private1}}, &(0x7f0000000200)=0xe8) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0), &(0x7f0000000180)='./file1\x00', 0x8, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') pread64(r3, &(0x7f0000002300)=""/4096, 0x1000, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000140)=0x10000, 0x401) r4 = fsopen(&(0x7f0000000100)='exfat\x00', 0x1) lseek(r4, 0x1, 0x4)