syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000040)='./file0\x00', 0x5, 0x3, &(0x7f0000000680)=[{&(0x7f0000000500)="f3b22589f1ca811ece04cb3b20c8a902653500d9c3839e0818679313289361ab7551bd2cf1bace38027cddc65ab82d7fe4df1ce801b0fbda5be288d0500eb155d08cf5ea30981bd351b80d9c85f5752103300993c9cc53e75e4a56a94d15797038b85a2a784ed0a93bb9c613d4352123240bde0f01d691d92067699bc0fe5422b39168fb85f5891252464bd607", 0x8d, 0x1}, {&(0x7f0000000300)="372c111923d48d02000000000000a0c82f73ef6ac30000fb7f5664026913b4a4e4bf7305", 0x24, 0x9}, {&(0x7f0000000480)="181ddb4088a9fe68e87df520", 0xc, 0x6aad}], 0x11064, &(0x7f0000000700)={[], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@permit_directio}, {@subj_role={'subj_role', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@euid_lt={'euid<', 0xee01}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161610f6c9743c90fd39b7828e4ff3131313131313131313131313131313131313131"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x2c, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x9, 0x0, 0x0, 0x0, @str='\xca\xe5\x00\x00\x00'}, @typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x2c}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000600)) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r2, r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000280)=[0xffffffffffffffff, r3], 0x2) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86)