sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB='grpjquota=./file1,max_batch_time=0x00000000000006e2,usrjquota=,test_dummy_encryption,barrier=0x0000000000010000,delalloc,smackfsfloor=,hash,rootcontext=system_u,euid>', @ANYRESDEC=0xee00, @ANYBLOB="2d6d6173efc2abac12f007707851e340476b3d5ec79e3dc3526209000000b88d5294ac289871a6d687a9d966c0efcf9fcff0be2f74d1bc108c48975ee9122dfcffffffffffffff2fe2f77a9342d4cb92c894ca28238d8b0fea789e8c37e0cbc83274415d6b4fc81f6a46e12b"]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x10, 0x0, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = getpid() ptrace(0x4208, r2) waitid(0x0, r2, &(0x7f00000000c0), 0x8, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, r2, 0x4, r3, 0x1) openat2(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x18d080, 0x129, 0x19}, 0x18) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff)