r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udplite\x00') lseek(r1, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r2, &(0x7f0000000580)='pagemap\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001d00210c00000000000000000aff0f000000000000000000140001"], 0x30}}, 0x0) r5 = mq_open(&(0x7f00000004c0)='\\{-\x00', 0x840, 0x20, &(0x7f0000000500)={0xff, 0x7f, 0x3f, 0x3272}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00']) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0, {0x8001}}, './file0\x00'}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000005c0)={0x1, 'ipvlan1\x00', {}, 0x9})