r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r0, 0x0, 0x501000, 0x9) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r2, 0x40309439, &(0x7f0000000a00)={0x0, 0x2, 0x1}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f00000003c0)='./file1\x00', 0x7f, 0x5, &(0x7f0000000900)=[{&(0x7f0000000400)="69be5e50fb87e5392931fdb9428c4fc57534f84aadcb18a600aab14c332abca1097163692dec7999dd8f67bf218c02697fff6979c32ab50e1003a865b0b642af34ea53e0e4337c7b5dfc9e3c82b0", 0x4e, 0x8}, {&(0x7f0000000500)="5f6c160ab543b25941b18c10c0ac673767be3e91bdd1e611b46811927fc7bc43fb1078f9b8c3ca9edde8600d5271b324000673271b3e2c732680cfea4fb4c45cc4e02e0c4aac14abe3ab19f42942a825776fa84d3df4129c5b32e7a3745b3fd75f0e4943df0e2e7f5c80b9ee8b91aa5feb59e606caa264696f0b1aa65e15b19f4d04f2740a4c55fd6a6137f9b50235863c1473b00ae26e1ce9fbfa585756a1755a4c97db309b519688bb9cfdbbe7143b3e97131c418a71eb4a84a9e5bca56583a1a90da789ddf803d824e8fab8525e1601dc7a66e46064f1cefa40fdce2276aab0dde6a26b2341d808ef46f46ca43f4d7b5f0bf8412a3714cb", 0xf9, 0xe4ad}, {&(0x7f0000000600)="d9a2576a56548af722b037cdd7cc1071db247eecd9e7ab51cd1f731c0e342712040aea6f7ce3fb022ddcfe69310174797968225d31c1200cbee40dee6b9be9d0126af8b42b2fe6b3b05aae51bab202215dc3d06b928b6a7565f7b4579b56886336248addb5366a258f4576a0dae33b7d3ee84e3685a278b3964d78161049920aa2b2280c43fe4e5cdeacb2cf2d138ddaa188942d5b2e46a554d964fa04839188526207f8ba90a32844ded300e22e9c8a10c9f356238ce56cd950c5932ef3044b", 0xc0, 0x1f}, {&(0x7f00000006c0)="3a5d4cf1269757943f59e58e273a325fd5d5a388c08f95d89cd074ce7ba78ddf642fa6f621c47237982d86898d273ae3b5e0d76c50c0fe2a0c1cdfaa1951535f83d697c40b5c9cbe93e4e4ba1bc9bff06c5e03e67ecdbb222857a8a97af01db5364c6095", 0x64, 0x1ff}, {&(0x7f0000000740)="63fb6ca79f291e40117721df18d99fe0f60b609ec9406ae7f8e56f4feda897ed42d24198530dbdd1bcb8640f1d111c1e9c2a21cd2f1b15dae746341d363f46c7c9e9ed4c8971b053ddf44109872b1ee5afcb244a71791c8371ad49cf254e8c12e89e11a20876b05c20d887b53477d875236fe7fcfedc6aacd0ce7c65fe622ba233188484b5320f2c727c983f484fd7dd7b70fd84b0b0ec14f9ceedf70e5518b036ec4f16daab50e49ba1a3e93cc346c621ef34955c11b8fc709a7747b8b96fc8d3fee380d98af38efcf50d882eb642268ae322f8f01f6e806d01899cf8666453ff0df8c507", 0xe5, 0x2}], 0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYBLOB="74636f6e746578743d737461180027fb"]) writev(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r4) bind(0xffffffffffffffff, &(0x7f00000002c0)=@nfc={0x27, 0x0, 0x0, 0x2}, 0x80) r5 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x100000001) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x89)