ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="006c6530000000d0d8219c7b8962a06046606f000000000000000000591dc688ad5daad3738b71efd240a7775342efd6e8e5010000000d8b16d4c3e2e5faf5446537e8e1f78e8416ba95ba6906011613471a3b8a9c4cbbdcab4aa1695bbe9bf1043339b045eee460c3efbeddafdce79ff931dbed8815d9b47940eef44198e0cd3bfb3dbb1a6c21"]) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80080, 0x0) readlinkat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)=""/137, 0x89) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"]) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) r3 = openat(r2, &(0x7f0000000000)='./file2\x00', 0x441, 0x8) fallocate(r3, 0x0, 0x0, 0x1000002) ioctl$BTRFS_IOC_SCRUB_CANCEL(r3, 0x941c, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x4000) lseek(r4, 0x3f, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x2b8802, 0x1) preadv(0xffffffffffffffff, &(0x7f0000001c00)=[{&(0x7f00000005c0)=""/196, 0xc4}, {&(0x7f0000000200)=""/64, 0x40}, {&(0x7f00000006c0)=""/4084, 0xff4}, {&(0x7f0000000300)=""/99, 0x63}, {&(0x7f0000001840)=""/64, 0x40}, {&(0x7f0000000480)=""/3, 0x3}, {&(0x7f00000016c0)=""/160, 0xa0}, {&(0x7f0000001880)=""/116, 0x74}, {&(0x7f0000000440)=""/35, 0x23}, {&(0x7f0000001900)=""/121, 0x79}, {&(0x7f0000001b80)=""/66, 0x42}], 0xb, 0x6, 0x8e6) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001800), 0x4, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r6, 0xd0009411, &(0x7f0000001e00)={{0x0, 0x80, 0x9, 0x2, 0x400, 0x2, 0x8, 0x3ff, 0x400000, 0x2, 0x2, 0x100000001, 0x8, 0x9, 0x20}}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RELOAD_REGDB(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x2004c0c0}, 0x4c040) dup2(r5, 0xffffffffffffffff)