r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/383], 0x12) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendfile(r1, r0, 0x0, 0x8000) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fef000/0x2000)=nil, 0x2000, 0xf, 0x12, r0, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000, 0x5, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mbind(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x0, 0x0, 0x0, 0x2) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r3, &(0x7f0000000880)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000040)=[{&(0x7f00000001c0)="02c3", 0x2}], 0x1, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @local}}}], 0x20}}, {{&(0x7f0000000440)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f00000007c0)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc, 0x7, 0x3, 0x0, [{@private}]}]}}}], 0x20}}], 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000600)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x102) execveat(r4, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f00000003c0)='wlan0\x00', &(0x7f0000000440)='\xd7,+[-&@\x00'], &(0x7f0000000440), 0x1000) ftruncate(r4, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r4, &(0x7f0000000040), &(0x7f00000008c0)=@v3={0x3000000, [{}, {0x1ff, 0x7f}]}, 0x18, 0x0) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[], 0xfdef)