r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {&(0x7f0000010500)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000b7e770325132510000e770325103", 0x5b, 0x2800}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0000b3b00891c079e88caa9e96a9055fa6746930d8a5e1fcbb0fbc08fffa3058ef2d89f8b6d0a5747f0d6f3b30c72e94b9959b80f515cabfa48b1f6c8ff51528cb837404c8fdba030000000045dc1d638af2fcac52d36f6f0fd86d3e129705c76523fc5e6f17f392d9b94e415650f65d8c1d45c297dca8e5866b7d8410cdd81ce1e26e19e6cc1f4ccf517ad3aab47faf99f04ae7102d94e8bd386dc32171811e35c7f9f8886505419caca4f1325ce16151068a9d36b3fedb9929684d98235c5ec8637f753db6"]) mkdirat(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r2, 0x800448d4, 0x0) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, 0x1}, 0x6) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000180)=ANY=[@ANYBLOB="9862b623835569830eeb0100", @ANYRES32=r1, @ANYBLOB="03000000000000002e2f66696c653200"]) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) mq_notify(r4, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000059c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYRESHEX=r4], 0x28}}], 0x2, 0x0) execveat(r4, &(0x7f0000000640)='./file1\x00', &(0x7f0000000880)=[&(0x7f0000000680)='vfat\x00', &(0x7f00000006c0)='vfat\x00', &(0x7f0000000700)='&-&\x00', &(0x7f0000000740)='+\x00', &(0x7f0000000780)='vfat\x00', &(0x7f00000007c0)='#[\x00', &(0x7f0000000800)='-$*\xe7\x00', &(0x7f0000000840)='\x02^:\'\x87*&,\x00'], &(0x7f0000000980)=[&(0x7f00000008c0)='vfat\x00', &(0x7f0000000900)='\x00', &(0x7f0000000940)='vfat\x00'], 0x1000) close(r3) r5 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r6 = gettid() process_vm_readv(r6, &(0x7f0000001440)=[{&(0x7f0000000b80)=""/70, 0x46}], 0x1, &(0x7f00000019c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) clone3(&(0x7f00000005c0)={0xb4801900, &(0x7f00000001c0), &(0x7f0000000400), &(0x7f0000000440), {0xf}, 0x0, 0x0, &(0x7f0000000480)=""/241, &(0x7f0000000580)=[0xffffffffffffffff, r6, 0x0, 0x0, 0x0], 0x5, {r5}}, 0x58) getdents64(r1, &(0x7f0000000240)=""/155, 0x9b) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000140)={0x2000}) clone3(&(0x7f0000005880)={0x6f904900, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0}, 0x58)