r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000480)={{0x1, 0x1, 0xfffffffffffffdef, r0, {0x5}}, './file0\x00'}) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x5, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x102, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}], ['\x00']}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="3c00000001000000030015c1e10000030000000220000001dee8fc131fc92b570000000100008068fb93f20624d998bb2382fbef2e605d20efd13ad8020454fe726d5ec494d8000000000000b7382cb035aee7d07675"]}) r2 = openat$incfs(r1, &(0x7f0000000000)='.log\x00', 0xd00, 0x110) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x5, 0x2, &(0x7f0000000740)="863cf8ce1700f42261393953da36a63b209612d9116c9cfc735b5bb9358250eba09f73a7360caf7e84407e838fd6bf03357cd5ca05856cabc9e6260dcf94f034a2955982da57825edaca5c9f40fa1d4634659cb99c89c8830c6c6701d6c8c82fa5a36072f3e0f2262914d8e6b4cdb9bc5b250334d0b7b76f861cd87bcbfe3c17c7b24c92acde797aaa8e17a06f915b4837950d2629fc2e26c5f144dd45907b8885c9c7774cac8ba191937948d44f8c0b942b04875c641ccd2937ae4f6ba4e5a8db218af043f51e7e66637190ac44d460e88a966e56b396ed1ac69054e112f0da0a0858", 0x4ce5, 0x0, 0x0, {0x1}}, 0x7f) sendmsg$nl_generic(r2, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="d400000014000268e872002a36e58c2516000000309195bcedd4a355ffd0b5b1b64283347d36c80aa3cd5c00a209ab410588e2acf39f612a058aca019d424c1cfefa9bd84118e7b9a3dc7b648488e3b314280151f16e53c3b34d356001432e0e379bfac2e264d49dde22ffb05d71782e4588a22902e120c9b3e8ac10a180903c642a26552443488705f8f9389f0dc82f10989f62b3874701ee49da692b47f3a2374ddcf5407ac1d8d6ece93e6956a83bca75748906b35121f4bfbcd532464798ecfcbf0151eccc1703000000e09aefabad56510f51901f721fb774488673f91400000000ff7f"], 0xd4}, 0x1, 0x0, 0x0, 0x8010}, 0x400c8d1) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000540)={0x3, 0x9, 0xfffffffffffffff7}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) r4 = signalfd4(r0, &(0x7f0000000180)={[0x7]}, 0x8, 0x80000) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x100, 0x100) dup(r1) prlimit64(0x0, 0x5, &(0x7f0000000440)={0x4, 0x16ba}, 0x0) ioctl$VT_WAITACTIVE(r4, 0x5607)