ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000540)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="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"]) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)=ANY=[@ANYBLOB="960d00000000000003000000", @ANYRES32=r0, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file0\x00']) pkey_alloc(0x0, 0x0) mknodat$loop(r1, &(0x7f00000001c0)='./file0\x00', 0xc000, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)