openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x18) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/netstat\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$unix(0x1, 0x5, 0x0) pread64(r0, &(0x7f00000003c0)=""/152, 0x98, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x93b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000800)=ANY=[@ANYRESHEX=r2, @ANYRESHEX, @ANYRESHEX=r2, @ANYRESDEC=r2, @ANYRES64]) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000880)={0x14, 0x52, 0x69844ea0a6ddcd11}, 0x14}}, 0x0) readv(r3, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/116, 0x74}], 0x1) r4 = dup3(r1, r3, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000380)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=ANY=[]) pivot_root(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file1\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="05000000000000fbffffff696c650b12747689e2ae97000367bf01ed54b9c8"])