sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x800000000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', 0x0, 0x7, 0x0, 0x0, 0x802, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file1\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYRES64=r0, @ANYRESDEC]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r1, 0x0, 0x10, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000500)=""/187, 0xbb, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x774bd0b2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x80) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) unlinkat(r3, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=0x11a) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x82307201, &(0x7f0000000300)) openat2(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x18d080, 0x129, 0x19}, 0x18)