ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000e40)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000002) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r0, 0x800, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_io_uring_complete(0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r3, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000340)={{0x1, r3, 0x0, 0x0, 0x0, 0x41, 0xfe04}, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7f}) stat(&(0x7f0000000280)='\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1/file0\x00', &(0x7f00000000c0), 0x205810, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@smackfsfloor}, {@obj_type={'obj_type', 0x3d, ',:+'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '$\''}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@subj_role={'subj_role', 0x3d, ')*'}}, {@context={'context', 0x3d, 'system_u'}}, {@permit_directio}, {@euid_gt={'euid>', r4}}, {@obj_type={'obj_type', 0x3d, '['}}]}}) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000040)='.\x00', 0x2000003) sendfile(r0, r1, 0x0, 0x100000001) setresuid(0x0, 0x0, r4)