ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000e40)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r1, 0x800, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r3 = inotify_init1(0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000000c0)=0x68) mount$9p_xen(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=xen,access=', @ANYRESDEC, @ANYBLOB=',loose,obj_type=system.posix_acl_default\x00,euid<', @ANYRESDEC=0xee00, @ANYBLOB=',subv_lser=,,\x00']) inotify_add_watch(r3, &(0x7f0000000040)='.\x00', 0x2000003) lsetxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580), &(0x7f00000005c0)='./file1\x00', 0x8, 0x2) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000600)=ANY=[@ANYRES32=0x0, @ANYBLOB='$}', @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fddc13df3a2d491d1959acca5ad771f779c3102b9e127e21e8e000bae41d9d0ac353a279a93a8993f9be9bf2bf4102dc9550f9da56922eaea9f05cc1d2b5ad1e5f91ed8c92130df26d25", @ANYBLOB="833c678370f3c0192ac188feb41b83ac313c590a167c26366de7f6e94cb8219a7507ba522321e981b5233ef8032e49e3be17be074a55cfd8e89533042142096aa61f2bc5a8f908ac9cc3843f027c01f2334ad2e79d3f2c82c80a5bc908d669104ff40372b598db400aae9e28aad05434b34918ae7976083b1db3b6a5ed213190bdad88f424f57630900046a0c23f37a33f7399fc671d5de6029a42bdef9e111621241fda4ceb28f36de06b384da28824010b5e607a5add8d5b484985"], 0x54, 0x3) syz_io_uring_setup(0x2201, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r6, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r6, 0x1, 0x53, &(0x7f0000000440)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000500)=0x2c) sendfile(r1, r2, 0x0, 0x100000001)