sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x800000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x774bd0b2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x80) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unlinkat(r1, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=0x11a) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[])