r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x80500, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r0, 0x8008330e, &(0x7f0000000200)) ftruncate(r2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) syncfs(r1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYRESHEX=0xee01, @ANYBLOB="ca6700ee3c5cf82fe22490b4080049980cb058100001000000000000000000000000003cb267190000a1a41156a63559d8c56f52d58b4e9a97d3a51e7ff9883ea16d9d80c7fbfa75d8cf60000039658a70fdaac3136eea651691b78d982cc5a7b8653577e175e130409dc40edfda023788981d6591710c701a0c007aa12bb4d9dd66090040572473bb3893a3345676771b4a0a65f57226071070fb093856d078d3627fd8d55277da1103deb9b076ac030000000000000000000000000000000000000000000000000000f5000000000000000000000000007a40"]) r3 = socket$inet(0xa, 0x3, 0xff) r4 = dup(r3) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000000180), 0x4) r5 = dup(r4) pipe(&(0x7f00000001c0)) setsockopt$inet6_int(r5, 0x29, 0x16, &(0x7f0000000180), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in=@multicast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) quotactl(0xffffffffd91786bf, &(0x7f0000000640)='./file0\x00', r6, &(0x7f00000007c0)="e67d4e445d043e4ed73aeba53c0f04121c87797ca74a29f91a0f88351ff47826274fd10dc42f180ada0a097b43e583999e32f65720a8360828a5adc1aa9b53795ebdb4c02aaf6f76a8ecf69cc76140686f5d04ffddb3fa7f460463d5907402d30e5cfbbd146b0fafea7ba6f1a41cd0a5f0c809c53add009c360d34989f8cc5710a8b8aa48deaa3a7a1f600f11291114117ec41625bf83e787595f06549f14dea593152c7b1cf79a2cd") perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)