r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}, {0x0, 0x0, 0x7da}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x7, 0x0, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)={[{@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'cp850'}}, {@numtail}, {@numtail}], [{@fowner_eq}, {@pcr}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@dont_hash}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}, {@uid_lt={'uid<', 0xee00}}, {@dont_measure}, {@uid_gt={'uid>', 0xffffffffffffffff}}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0xc00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001500)={{{@in=@remote, @in6}}, {{@in6=@private2}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xffffffffffffff8d) ioprio_get$pid(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000900))