ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x90101, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xc4, 0x13, 0x1, 0x0, 0x0, {{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@policy_type={0xa}]}, 0xc4}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="7f454c460981088f01000000000000000200060001000080b20100000000000040000000000000000f02000000000000018000000010380002000800ff07080003000000c80a0000090000000000000000100000000000000004000000000000000000000000000004000000000000000900000000000000010000004f0400000800000000000000e400000000000000ffffffff00000000a492000000000000ff0100000000000005000000000000004051fc834d71fbf72564c0f007f85eb9f72b84123ab4023f4075e1e6fcfd06281943d9a0493c84b950031c2b593ad274732da78b05f25b9d3cef7ffe1062ad0a409da07705ff156321076d68abac9736a9fbef7f5b5e3adc8ad2e42e78dc2743933ca6beeeabc05bb084e3a27d6fbd7447ce9867d8b20cd465bae1d28a2696e2b08985020337c974e9fef38d8581e6f049183a99b3028c5153548654c8113f250c1baa6bb981500484d097eb109676b4f2181554c8c8070668bd48b0303ef72d"], 0x170) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat2(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x444002, 0x2}, 0x18) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {0x77359400}}) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000580)) r3 = fsmount(r0, 0x1, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r3, 0x3312, 0x8) fsmount(0xffffffffffffffff, 0x0, 0x4) stat(&(0x7f0000000540)='./file0\x00', &(0x7f00000004c0)) mount$cgroup(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x2812020, &(0x7f0000000400)=ANY=[@ANYBLOB="6e616d653d2f6465762f736e617073686f74002c6e616d653d68756765746c622c616c6c2c6e6f6e652c6370757365745f76325f6d6f64652c78617474722c6e6f7072656669782c636cdfe7af084ab5f43bf36f6e655f6365746c622c66736e616d653d2f6465762f7a65726f002c736d61636b6673666c6f6f723d2e282b2d5e2c6f626a5f726f6c653d5e282c00c01bb33846a6662412e8d1f8bafc523e011c45bb8386b1254b86bb32f5b5b695499776"])