r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000380)=ANY=[@ANYRES32=r1, @ANYBLOB="00000000000000002e2f6676dd62c9dd1883df696c653200f6b4371731cbf05440d1ed8ce5862d8576839f3ab27ecdae288750c957"]) openat(r2, &(0x7f0000000280)='./file1\x00', 0x701f02, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000180)) dup(r1) r3 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000440)="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", 0x104}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000005c0)=ANY=[]) mkdirat(r3, &(0x7f0000000340)='./file0\x00', 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='pagemap\x00') lseek(r4, 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000300)=0x5, 0xa5c9, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) write$binfmt_script(r3, &(0x7f0000000580)={'#! ', './file1', [{}, {}, {0x20, ']('}, {0x20, '/dev/snapshot\x00'}, {0x20, '\x00'}, {0x20, 'pagemap\x00'}], 0xa, "e46dc0de432b1844615c94e71ad9dbbbb301136d0e57d243cb215057204f6cbfe1f1820081502a96b04f085d6e0ac1fa2c2d0cf983dc6f2da5dffbf8da55f7f00c6958debb8f780a08ecea15a0aff62d2e1477faceacc853faacbd598a88247ec0d985187edfb238ff76088a7d4ac322f24d5c235e13758c"}, 0xa2) r5 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) ioctl$BTRFS_IOC_QUOTA_RESCAN(r5, 0x4040942c, &(0x7f0000000040)={0x0, 0x1fa, [0x0, 0xc8a2, 0x0, 0x386, 0x101, 0x2]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) socket$netlink(0x10, 0x3, 0x13) sendto$packet(0xffffffffffffffff, &(0x7f00000002c0)="99ffdd527aa304bdb341363cc42306a90c2fab1f6be2d4d8e5c2d56fb76c3c061e86f0856d6f87b84a92b65a8bd64561dd068ce027e3ab1e55", 0x39, 0x40000, &(0x7f0000000400)={0x11, 0x2, 0x0, 0x1, 0x9, 0x6, @random="ef64fa7843e8"}, 0x14)