r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x80500, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r0, 0x8008330e, &(0x7f0000000200)) ftruncate(r2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) syncfs(r1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYRESHEX=0xee01, @ANYBLOB="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"]) r3 = socket$inet(0xa, 0x3, 0xff) pipe(&(0x7f00000001c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x16, &(0x7f0000000180), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in=@multicast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) quotactl(0xffffffffd91786bf, &(0x7f0000000640)='./file0\x00', r4, &(0x7f00000007c0)="e67d4e445d043e4ed73aeba53c0f04121c87797ca74a29f91a0f88351ff47826274fd10dc42f180ada0a097b43e583999e32f65720a8360828a5adc1aa9b53795ebdb4c02aaf6f76a8ecf69cc76140686f5d04ffddb3fa7f460463d5907402d30e5cfbbd146b0fafea7ba6f1a41cd0a5f0c809c53add009c360d34989f8cc5710a8b8aa48deaa3a7a1f600f11291114117ec41625bf83e787595f06549f14dea593152c7b1cf79a2cd") perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)