r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184039dec11440b3e48a1e7da90d66139125010020ccdd01fdd080582c9a357603f914afba1b6ea392f2fcb41548673044f36e3362b2a2d9a21c6a4a798629791e5167d33e25f942f6b252f62d5000000000000"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xff28) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000001880)=ANY=[@ANYBLOB="646f74732c646d61736b3d3030403030303030303030303030303030303030313737646f74732c009426ca11b7717bde99bd88adfded2804a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72d6738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea76a366e933a29dcd767a79952a4ec5882ed891f550ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3cc2f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bc9b46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b33487d0cad42474f2ef4c67d30000000000000000000000000000000000000000c0c6a0779c1ef8510c4679bd6273bff81f620949ce49891389e94e93687dc6d0a41b5fc6442303e23829eb72516a2184ab6e3aae4ad475c0c7e95ec7f9f843122653c70d0983720eeb1d9d517ca15476e10e01ff8bfebabaf9caa32d75b6bbd1a6a142702fd8930e7250f1c7de66610bdfaeae374821371178d6c4fd0a76913a9e55024d55d07092870eaac99d6ca569604913c7aa31b487d7f7a2b33c4f2ac328d72d8b3b81dc7b1d4587e0a5c1e6ef3c4e5b2704d070a49924732b37d3cfdf7a383068147e851d93ef76c06aa28978fbd2dafea7c70000000000000000"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = dup(r6) r8 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r8) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) perf_event_open(&(0x7f0000001740)={0x3, 0x80, 0x1, 0x8, 0xef, 0x7f, 0x0, 0x630, 0x282, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000340), 0x2}, 0x4212, 0x7f, 0x9, 0x6, 0x4, 0x0, 0x3, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r9, 0x0) inotify_add_watch(r7, &(0x7f00000001c0)='./file0\x00', 0x2000000)