r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x80500, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r0, 0x8008330e, &(0x7f0000000200)) ftruncate(r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYRESHEX=0xee01, @ANYBLOB="ca6700ee3c5cf82fe22490b4080049980cb058100001000000000000000000000000003cb267190000a1a41156a63559d8c56f52d58b4e9a97d3a51e7ff9883ea16d9d80c7fbfa75d8cf60000039658a70fdaac3136eea651691b78d982cc5a7b8653577e175e130409dc40edfda023788981d6591710c701a0c007aa12bb4d9dd66090040572473bb3893a3345676771b4a0a65f57226071070fb093856d078d3627fd8d55277da1103deb9b076ac030000000000000000000000000000000000000000000000000000f5000000000000000000000000007a40"]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB="342f66696c6530006920015f1db0eaabec57412a3c93a0039602aaab0575abf30418b3697baae9e2aace4804585e40f7494f8521b06b461c205f6f96bfe2b2d0a440bf19fe1931ebbe216046b6613fd4463fc5c5a1b25ca6c8596e96f191d68dc30550d48a1ac3"]) r3 = dup(0xffffffffffffffff) dup(r3) pipe(&(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)