ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3067, &(0x7f0000000380)={0x0, 0x9b7a, 0x10, 0x0, 0x3c5, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000140)={0xb, 0x29, 0x2, {0x2}}, 0xb) pkey_alloc(0x0, 0x0) mknodat$loop(r0, &(0x7f00000001c0)='./file0\x00', 0xc000, 0x1) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x200000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) listen(r1, 0x2cd7) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000)