perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000380)=ANY=[@ANYRES32=r0, @ANYBLOB="00000000000000002e2f6676dd62c9dd1883df696c653200f6b4371731cbf05440d1ed8ce5862d8576839f3ab27ecdae288750c957"]) openat(r1, &(0x7f0000000280)='./file1\x00', 0x701f02, 0x2c) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) dup(r0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000005c0)=ANY=[]) mkdirat(r2, &(0x7f0000000340)='./file0\x00', 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='pagemap\x00') lseek(r3, 0x0, 0x0) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) r4 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) ioctl$BTRFS_IOC_QUOTA_RESCAN(r4, 0x4040942c, &(0x7f0000000040)={0x0, 0x1fa, [0x0, 0xc8a2, 0x0, 0x386, 0x101, 0x2]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) socket$netlink(0x10, 0x3, 0x13) sendto$packet(0xffffffffffffffff, &(0x7f00000002c0)="99ffdd527aa304bdb341363cc42306a90c2fab1f6be2d4d8e5c2d56fb76c3c061e86f0856d6f87b84a92b65a8bd64561dd068ce027e3ab1e55", 0x39, 0x40000, &(0x7f0000000400)={0x11, 0x2, 0x0, 0x1, 0x9, 0x6, @random="ef64fa7843e8"}, 0x14) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e22, @empty}, 0x10)