r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000a00)="506cbe107bf1cd4a237540a62b7d4311ed8c0a97faca6cc5e3a00525abf0e62875da9e7d0633cb5f4e2a9bf652b87af75c966cc769cfffabafb2a9ca2306827dd41d0001b60ed3d1a84c0a59a8dc491fb2dc9e1ca150a27f084646ecffd7f35838e3ea0e9683d2039490587119462c00d7d36fd30610422eed34bed7ed30cfa45bbad42ef7a3a1fb635bbeaf13123ebdd67d2ce47b20a6cc6c28aeec23a29a628d5b7bce35aeb391fca65916d1afadcef315e1de514c9c4ac2483a4e17ec69ad80e7be15393f560f35cf93b2d7750901277b", 0xd2) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000840)=""/104, 0x68}, {&(0x7f0000000500)=""/223, 0xdf}, {&(0x7f0000000b00)=""/250, 0xfa}, {&(0x7f0000000700)=""/2, 0x2}, {&(0x7f0000000180)=""/85, 0x55}], 0x5, &(0x7f0000000c00)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000f52f0cd6f48b72aa806f00000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x88}, 0x20) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21208, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xe}, 0x0, 0x4d, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x2) dup(0xffffffffffffffff) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x800c3e429c4f1bd1) r2 = socket$netlink(0x10, 0x3, 0x4) close_range(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup2(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x18, 0x29a101) setsockopt$WPAN_SECURITY(r3, 0x0, 0x1, &(0x7f0000000440)=0x1, 0x4) r4 = fork() ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000480)={0xffffffffffffffff, 0x3, 0x5, 0x739c6b16}) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r5) ptrace(0x10, r4) ptrace(0x8, r4) mknodat$loop(r1, &(0x7f0000000000)='./file0\x00', 0x80, 0x1) futimesat(r1, 0x0, 0x0)