syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x920420, &(0x7f00000000c0)=ANY=[]) setfsgid(0xee01) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000001c0)={{0x0, 0x1000}, 0x100, './file0\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') syz_mount_image$vfat(&(0x7f0000001140), &(0x7f0000001180)='./file1\x00', 0x4, 0x4, &(0x7f0000001540)=[{&(0x7f00000011c0)="d4855785b0c905980767ccb47056f7de0791faecccc25a3a2346e45e48c79a7e9988b43218da50a6575fede0c0781445a038d27809c16010bb725139871c0d85caf3f2b4bf3fb814f43e4612c10fe4523e657577a12ffdd7f43dbd614fd4ca9265d7288e07b3c8bd0d0f40b4ac25d0b0fd4bfe8521880b68e76f401498a5b22facc4f264506d01f00f18b866f3453d06a957ca5ea77e389620b1ba9a341dc364893fbeefaddb79ce1a8578466ef203024c42a1", 0xb3, 0x9}, {&(0x7f0000001280)="74a20e1f42d09acc1aba5060e4f722cdaa63b701a732b651a98286892353d4370a247c6f01bbdee7b89ac9e9ce961621e583bd0c0306147aac03b5bb073a5d2b58ff7731de9de503951b3d0b084fa3c5854856698436052963ec634c21c274ebb80f1dec4cfb38cce35fcef25d83cb575170783ab55179043dba3aa76f281858b9272db908859600f5ba6a6d83ecfaca9d4d7a", 0x93, 0x4}, {&(0x7f00000013c0)="bde92b145ff5c0b10204594ae28540b3105fc94b0b0cde512f77a33f9b871af9efffd3ab8917b4bbf41c30e958a650832143974fbf66b19a001416a41c679c4955488567f5332650e46ee1b0d87b98b6", 0x50, 0x401}, {&(0x7f0000001440)="e3c6ae61bb87415aad6575494ad934c0e46fb01feefe49167e18feaefd2e89f8963c689f6e93717abcf443836c6fcd5d91e62dc12b4890d74b363f25b7917eeade8ffe05293ffbce7fa74463f3cf2cd673653773ed69570ec4b5227f623fe395ac6b35d12875a9735bb4d705d8c6b0101eda543ac2fe3e9d34b7a838b09d4961265d2d694c0c49341a4a1df972c9a981ae4f03b04717bdd19b0eed45a857f42dd156232e9ff0489e6e1e5b6f04c5123dc151603216a9811ac381337c2caa3007fae361dcdd720d756a9aec", 0xcb, 0xfffffffffffffff7}], 0x63, &(0x7f00000015c0)={[], [{@permit_directio}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}, {@obj_role={'obj_role', 0x3d, '+'}}]}) getdents(r1, &(0x7f00000000c0)=""/4096, 0x18) getdents(r1, &(0x7f0000001340)=""/67, 0x43) openat(r1, &(0x7f0000000540)='./file0\x00', 0x80, 0x143) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000040)='./file0\x00', 0xee01, 0x0, 0x1000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000005}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x400401, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x10) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f00000010c0)=""/3)