r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0x240, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x0, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x0, 0x9}}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000940)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="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"]) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb)