ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = inotify_init1(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x4) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r3, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000240)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x1, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, r3, 0x0, &(0x7f0000000280), 0x0, 0x8080, 0x1}, 0x0) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x44000, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="a94fbe8c1aa66fcf78c263eff3b498ef17250fc11c069b69f2de635484e3f51732bdb610a581d287b1ec8a816f1f23826f33d9b42b8743a451cad1b51218be7d84f61e36806cd6fe30979a11b0a2b830ec570e4950b6e0f755d8eb1d4f5e51bf9201284bedb44c87fc3cb1ab7509374dda946b8022c6", @ANYRES16=0x0, @ANYBLOB="9ab2b9a1a79a6618f4a4c6410eb3f14102df8661a0fc3b63339aa0234043a49f242e9fde3391c855044742202377db70d08d228d9d2299e94c21dfc8e63635ac2ea9ab1cd81c3690eb45f0bc14e7a68884807d5d075a255f7c432729903746b7f3f05e3cbb636806db53cf0e4483f5b0d02fbcd341c9207ffb8c6f149d26682a52d75a59a04a84155e3f55c0bdcfeaa587140ba79048e42a62671aa7f835e92b529bf27e0947ba16e240438c5342540a5d8db43bd147e8de59a2615a8f93c2010c6eade979f81ccf687a37656757921d24446aafccbf9d921446693953d07c2abffd644734c534cca1409c74c9", @ANYBLOB], 0x54, 0x3) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc0185879, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={{r6}, 0x4, 0x0, 0x1}) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x802, 0x0) fremovexattr(r7, &(0x7f0000000180)=@known='com.apple.system.Security\x00')