mknod$loop(&(0x7f0000000300)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c65302000202e2d200020000ab2c1bec4fc4167deb4a7fbacabda69751a591d5f9b9a2385df4a7031c840598f4ee5303afea8414f751db501bca30419fb7ce40f4fb23c3480465d6e7bcc98de2cf50729c167c63b732f0c4b782a1ae7a9c78634ab5c6419fb0e54cca7aeac876c574706bc529c46ab7dd039c66eac854a7c7dc85fb6bf41deae1a672a98f9851288098d58fc595d2c1a8c"], 0xa4) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000100)) openat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB="cb2a0000", @ANYRES16=0x0, @ANYBLOB="000825bd7000fcdbdf25030000000500050001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x240041c0) utimensat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', &(0x7f0000000500)={{0x0, 0x2710}}, 0x100) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0)