r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mknod$loop(0x0, 0x20, 0x0) r4 = dup(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0xd0009411, &(0x7f0000000580)={{0x0, 0xfffffffffffffff8, 0x0, 0x7, 0x5, 0x0, 0x6ea8, 0x26, 0x0, 0x5, 0x200, 0x3ff, 0x3, 0x400}}) pwrite64(0xffffffffffffffff, &(0x7f0000000240)="73bd0b40e209831af1bc57b3c2871296c8593f7ee92229de6372b835e7c181d8bafc4775f5ac8a9033fc4ec2f65658491594ad731c945d8ed9d829", 0x3b, 0x0) write$binfmt_elf64(r3, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC, @ANYBLOB="3252a120f2721e528d21cac0d3700b964d4c3fc620e22f7e74be4b76638a4c7a4b6df024b380563c63172056edd5fcec2926719a1ce8ea420745d3ab0a7d4e5e1f5e7be43b86959bbac3a56cfee27fe7a2300bbd6f914d2cc8b9ccff539a9b942fa921570a", @ANYRESDEC=r1], 0xfdef) syz_open_procfs(0x0, &(0x7f0000000280)='net/protocols\x00') ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3fd, 0x9, 0x7}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xc, &(0x7f0000000080), 0x4) syz_io_uring_complete(r2) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x8, 0x1}, 0xb144, 0xb7c8, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="31960c00de9cad000004000000000000006c0aa15b0050cf710467e35600899aed79000000"])