r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "caf3fd84e0d0ab35c933c2235a52cb634c1f94"}) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000500)) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x220021, &(0x7f0000000c00)=ANY=[@ANYBLOB="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", @ANYRESHEX=0x0, @ANYBLOB="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"]) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000005c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="07000000000000002e2f66696c65c800e6b62dc95ab95fb51efeda6151e0a300356d94797300a795fa98fc72c0effaf23211d2dc7318625bc1a7c4acf8f0c9d37999e33c7c73f085cbf74b25"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0xfffffffe, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0/file0\x00', 0x600040, 0x128) sendmsg$NL80211_CMD_RELOAD_REGDB(r2, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x50000480}, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="f2ffffff0000ffc5d536a70000000000000000a81e501cd965fa0d61d56994bef630b8743ea354c3ef32237e7dbb12592f1ca96a390944d9361579fcd52df385ae249f98a784"], 0xb) mknodat$loop(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xc000, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)