r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x1a10c0, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(r1, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r2, &(0x7f0000000580)='pagemap\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="300000001d00210c00000000000000000aff0f0000000000000000001400015922351484be6bc119f006846ab466c341253294699fbbfd7a89d56b788d691ef1b6503978b2300778de2d9ba32a311f86f3221d70cde55b22b645d92b44dbaef713d63956837865ab881b62aeb437ffd39d07930f48506c1ff560dc09090a8ccd071fd7138735"], 0x30}}, 0x0) ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, &(0x7f00000005c0)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744b3c7cdae59396790d4bfb14"])