r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x4d00, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0xc1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x78) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000002c0), &(0x7f0000000300)={'U+', 0x9e8c}, 0x16, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/zoneinfo\x00', 0x0, 0x0) syz_io_uring_setup(0x620e, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000400)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) ftruncate(r3, 0x9) accept$inet6(r1, 0x0, &(0x7f0000000200)) syz_io_uring_complete(r2)