6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:23 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:23 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:23 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:24 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="0e27975c522472724e964e86f1fe00b96b7095c28406e4a371273353ecd2b80f9861478dd43f46ecacabe915b367b681a0fc0b0b7bcd9b35e2471b4f295292c45f70f797e0af4431355efeaef58979b7b2c44fab3039549c0353a98784703d387e73f5c33544724be97a65647236c356372be4fe43004389a187600289fc5b912055bf2d44417b4b8b549216c3b4385fdfe7acc610242019208c0dfaa4bea93eb10aa2d7aa3606405521b68b34b1f626a023f0259430dec820187439fcd6782f6de32cbe00f6e4210763a03fe3cfb7861f3f25c09787a9fff6873bf7e44975c37aa0a0b6a05ef4b87411a9d92378d4518362ecb9b1b5bfad63d08ed9af58b8", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:25 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)="3d5be369287c7a6ca5e41058efc9d5a27d", 0x11, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb5", 0x55, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)="3d5be369287c7a6ca5e41058efc9d5a27d", 0x11, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:26 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="0e27975c522472724e964e86f1fe00b96b7095c28406e4a371273353ecd2b80f9861478dd43f46ecacabe915b367b681a0fc0b0b7bcd9b35e2471b4f295292c45f70f797e0af4431355efeaef58979b7b2c44fab3039549c0353a98784703d387e73f5c33544724be97a65647236c356372be4fe43004389a187600289fc5b912055bf2d44417b4b8b549216c3b4385fdfe7acc610242019208c0dfaa4bea93eb10aa2d7aa3606405521b68b34b1f626a023f0259430dec820187439fcd6782f6de32cbe00f6e4210763a03fe3cfb7861f3f25c09787a9fff6873bf7e44975c37aa0a0b6a05ef4b87411a9d92378d4518362ecb9b1b5bfad63d08ed9af58b8", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) [ 632.629495] print_req_error: I/O error, dev loop1, sector 0 12:40:27 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)="3d5be369287c7a6ca5", 0x9, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="0e27975c522472724e964e86f1fe00b96b7095c28406e4a371273353ecd2b80f9861478dd43f46ecacabe915b367b681a0fc0b0b7bcd9b35e2471b4f295292c45f70f797e0af4431355efeaef58979b7b2c44fab3039549c0353a98784703d387e73f5c33544724be97a65647236c356372be4fe43004389a187600289fc5b912055bf2d44417b4b8b549216c3b4385fdfe7acc610242019208c0dfaa4bea93eb10aa2d7aa3606405521b68b34b1f626a023f0259430dec820187439fcd6782f6de32cbe00f6e4210763a03fe3cfb7861f3f25c09787a9fff6873bf7e44975c37aa0a0b6a05ef4b87411a9d92378d4518362ecb9b1b5bfad63d08ed9af58b8", 0xff, 0x2916}, {&(0x7f0000000580)="3d5be369287c7a6ca5", 0x9, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb5", 0x55, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:27 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="0e27975c522472724e964e86f1fe00b96b7095c28406e4a371273353ecd2b80f9861478dd43f46ecacabe915b367b681a0fc0b0b7bcd9b35e2471b4f295292c45f70f797e0af4431355efeaef58979b7b2c44fab3039549c0353a98784703d387e73f5c33544724be97a65647236c356372be4fe43004389a187600289fc5b912055bf2d44417b4b8b549216c3b4385fdfe7acc610242019208c0dfaa4bea93eb10aa2d7aa3606405521b68b34b1f626a023f0259430dec820187439fcd6782f6de32cbe00f6e4210763a03fe3cfb7861f3f25c09787a9fff6873bf7e44975c37aa0a0b6a05ef4b87411a9d92378d4518362ecb9b1b5bfad63d08ed9af58b8", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="0e27975c522472724e964e86f1fe00b96b7095c28406e4a371273353ecd2b80f9861478dd43f46ecacabe915b367b681a0fc0b0b7bcd9b35e2471b4f295292c45f70f797e0af4431355efeaef58979b7b2c44fab3039549c0353a98784703d387e73f5c33544724be97a65647236c356372be4fe43004389a187600289fc5b912055bf2d44417b4b8b549216c3b4385fdfe7acc610242019208c0dfaa4bea93eb10aa2d7aa3606405521b68b34b1f626a023f0259430dec820187439fcd6782f6de32cbe00f6e4210763a03fe3cfb7861f3f25c09787a9fff6873bf7e44975c37aa0a0b6a05ef4b87411a9d92378d4518362ecb9b1b5bfad63d08ed9af58b8", 0xff, 0x2916}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:28 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="0e27975c522472724e964e86f1fe00b96b7095c28406e4a371273353ecd2b80f9861478dd43f46ecacabe915b367b681a0fc0b0b7bcd9b35e2471b4f295292c45f70f797e0af4431355efeaef58979b7b2c44fab3039549c0353a98784703d387e73f5c33544724be97a65647236c356372be4fe43004389a187600289fc5b912055bf2d44417b4b8b549216c3b4385fdfe7acc610242019208c0dfaa4bea93eb10aa2d7aa3606405521b68b34b1f626a023f0259430dec820187439fcd6782f6de32cbe00f6e4210763a03fe3cfb7861f3f25c09787a9fff6873bf7e44975c37aa0a0b6a05ef4b87411a9d92378d4518362ecb9b1b5bfad63d08ed9af58b8", 0xff, 0x2916}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, 0x0) 12:40:29 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:29 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) [ 635.513040] print_req_error: I/O error, dev loop4, sector 0 [ 635.519603] print_req_error: I/O error, dev loop5, sector 0 12:40:30 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb5", 0x55, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:30 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:31 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="7c7e0e816477391e595b79e5c918c880680bb8245a5f2383435ca437a1a97dba578e23629fe6d7db9db1e67f5e7ca36d93f421a2cdc89ed7eae486fff1b6396243168c08b5547b9422c4c433fe7e85e3379b90eba6e140820a0ced0137cb6dba00e68fb66e394caddef0a6dee406a6aff3422cf1ff1e3ae8c6c40e452c9e6eb4ccff91e5f68cd37444357ccac1db0e47eddce39b33476cc5e4cf2aabdc80d82ddd9e4dc58eae715e573e248a8ad1db22c1831287e7a04890ab735a59da96c6c8f6adca7f4d5d019713366281e937aeb1426f1c0f422fe92e9535c88721caa80723daea4586982f5fb4176285fd464d13a37792c2e28d1ffe5da2e3b8ce", 0xfd, 0x7}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:32 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:33 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, 0x0) 12:40:34 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, 0x0) 12:40:34 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000380)="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", 0xfd, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x2916}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:34 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 3: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {0x0, 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) 12:40:35 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 2: syslog(0x9, &(0x7f0000000000)=""/104, 0x68) socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) 12:40:35 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 2: syslog(0x9, &(0x7f0000000000)=""/104, 0x68) socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) 12:40:35 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) 12:40:35 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) 12:40:35 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) fanotify_mark(r0, 0xa, 0x10, r1, &(0x7f0000000000)='./file0\x00') socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) 12:40:35 executing program 2: syslog(0x9, &(0x7f0000000000)=""/104, 0x68) socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) 12:40:35 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:35 executing program 2: syslog(0x9, &(0x7f0000000000)=""/104, 0x68) 12:40:35 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:35 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) fanotify_mark(r0, 0xa, 0x10, r1, &(0x7f0000000000)='./file0\x00') socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) 12:40:35 executing program 2: syslog(0x0, &(0x7f0000000000)=""/104, 0x68) 12:40:35 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:35 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) fanotify_mark(r0, 0xa, 0x10, r1, &(0x7f0000000000)='./file0\x00') socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) 12:40:35 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:35 executing program 2: syslog(0x0, &(0x7f0000000000)=""/104, 0x68) 12:40:35 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) fanotify_mark(r0, 0xa, 0x10, r1, &(0x7f0000000000)='./file0\x00') 12:40:35 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:36 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:36 executing program 2: syslog(0x0, &(0x7f0000000000)=""/104, 0x68) 12:40:36 executing program 0: execveat(0xffffffffffffffff, 0x0, &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:36 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) fanotify_mark(r0, 0xa, 0x10, r1, &(0x7f0000000000)='./file0\x00') 12:40:36 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:36 executing program 2: syslog(0x9, 0x0, 0x0) 12:40:36 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:36 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580), 0x0, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) [ 641.715067] print_req_error: I/O error, dev loop5, sector 0 12:40:36 executing program 0: execveat(0xffffffffffffffff, 0x0, &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:36 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) fanotify_mark(r0, 0xa, 0x10, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:36 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:36 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) fanotify_mark(r0, 0xa, 0x10, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:36 executing program 0: execveat(0xffffffffffffffff, 0x0, &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) [ 641.818667] print_req_error: I/O error, dev loop4, sector 0 12:40:36 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:36 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000180), 0x400) 12:40:36 executing program 3: fanotify_mark(0xffffffffffffffff, 0xa, 0x10, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:36 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:36 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:36 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:36 executing program 3: fanotify_mark(0xffffffffffffffff, 0x0, 0x10, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:36 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) 12:40:36 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, 0x0) 12:40:36 executing program 3: fanotify_mark(0xffffffffffffffff, 0x0, 0x10, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:36 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb541415849a860c32a4637696feca3f027766b6d96bc78fb9ca463302f6dd4a00caf91d60b6a70dc95a2a21d142d5814a97c47d001a842c0f3a4333119c7d8e5d3f6cee73acc569a12a453ee07fef668bccd9125d6", 0xa9, 0x8002}, {&(0x7f0000000580)='=', 0x1}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) [ 642.218292] print_req_error: I/O error, dev loop4, sector 0 12:40:36 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 12:40:36 executing program 3: fanotify_mark(0xffffffffffffffff, 0x0, 0x10, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:36 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:36 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 12:40:36 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, 0x0) 12:40:36 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:36 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 12:40:36 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:37 executing program 0: waitid(0x1, 0x0, &(0x7f0000000000), 0x1, &(0x7f0000000080)) arch_prctl$ARCH_SET_GS(0x1001, 0x0) 12:40:37 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:37 executing program 3: fanotify_mark(0xffffffffffffffff, 0xa, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:37 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:37 executing program 0: waitid(0x1, 0x0, &(0x7f0000000000), 0x1, &(0x7f0000000080)) arch_prctl$ARCH_SET_GS(0x1001, 0x0) 12:40:37 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:37 executing program 3: fanotify_mark(0xffffffffffffffff, 0xa, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:37 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:37 executing program 1: fanotify_mark(0xffffffffffffffff, 0xa, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:37 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:37 executing program 0: waitid(0x1, 0x0, &(0x7f0000000000), 0x1, &(0x7f0000000080)) arch_prctl$ARCH_SET_GS(0x1001, 0x0) 12:40:37 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:37 executing program 0: waitid(0x1, 0x0, &(0x7f0000000000), 0x1, &(0x7f0000000080)) 12:40:37 executing program 3: fanotify_mark(0xffffffffffffffff, 0xa, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:37 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:37 executing program 1: fanotify_mark(0xffffffffffffffff, 0xa, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:37 executing program 0: waitid(0x0, 0x0, &(0x7f0000000000), 0x1, &(0x7f0000000080)) 12:40:37 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:37 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:37 executing program 1: fanotify_mark(0xffffffffffffffff, 0xa, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:37 executing program 0: waitid(0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)) 12:40:37 executing program 3: fanotify_mark(0xffffffffffffffff, 0xa, 0x10, 0xffffffffffffffff, 0x0) 12:40:37 executing program 2: execveat(0xffffffffffffffff, 0x0, &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:37 executing program 0: waitid(0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)) 12:40:37 executing program 1: fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:37 executing program 2: execveat(0xffffffffffffffff, 0x0, &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:37 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) r5 = openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10, 0xfffffff9) 12:40:37 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:37 executing program 1: fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:37 executing program 2: execveat(0xffffffffffffffff, 0x0, &(0x7f0000000140)=[&(0x7f0000000280)='\'&*\x00', &(0x7f0000000100)='-^&.\x00'], &(0x7f0000000180), 0x400) 12:40:37 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:37 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) r5 = openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10, 0xfffffff9) 12:40:37 executing program 0: waitid(0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)) 12:40:37 executing program 1: fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 12:40:37 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000180), 0x400) 12:40:37 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:37 executing program 0: waitid(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 12:40:37 executing program 1: fanotify_mark(0xffffffffffffffff, 0xa, 0x0, 0xffffffffffffffff, 0x0) 12:40:37 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) 12:40:37 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) r5 = openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10, 0xfffffff9) 12:40:37 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:37 executing program 1: clock_nanosleep(0x7, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) r1 = socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x9, 0x6, 0x21, 0x2, 0x9e, 0xf3, 0xe4, 0x1, 0x1, 0x6, 0x1, 0x0, 0x27, 0x4}, 0xe) 12:40:38 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:38 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 12:40:38 executing program 0: waitid(0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 12:40:38 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) r5 = openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10, 0xfffffff9) 12:40:38 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 12:40:38 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) r5 = openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 12:40:38 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 12:40:38 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) r5 = openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 12:40:38 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 12:40:38 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:38 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40000, 0x1a) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x100, 0x40, &(0x7f0000000100)) 12:40:38 executing program 1: clock_nanosleep(0x7, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) r1 = socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x9, 0x6, 0x21, 0x2, 0x9e, 0xf3, 0xe4, 0x1, 0x1, 0x6, 0x1, 0x0, 0x27, 0x4}, 0xe) 12:40:38 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 12:40:38 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:38 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) r5 = openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 12:40:38 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) faccessat(r1, &(0x7f00000003c0)='./file0\x00', 0x90) 12:40:38 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:39 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:39 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) faccessat(r1, &(0x7f00000003c0)='./file0\x00', 0x90) 12:40:39 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) r5 = openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:39 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) faccessat(r1, &(0x7f00000003c0)='./file0\x00', 0x90) 12:40:39 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:39 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) r5 = openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:39 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb5", 0x55, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:39 executing program 1: clock_nanosleep(0x7, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) r1 = socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x9, 0x6, 0x21, 0x2, 0x9e, 0xf3, 0xe4, 0x1, 0x1, 0x6, 0x1, 0x0, 0x27, 0x4}, 0xe) 12:40:39 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) faccessat(r1, &(0x7f00000003c0)='./file0\x00', 0x90) 12:40:39 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) r5 = openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:39 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)="4536b207d357d8db9441b335d8a0a4958ea25ed914f51ce5fc8c756f4a71c7ad8909791bd80abca0f2c7bfff73739c749e0448330605a66a5e71cc72c8bfefedf0df311c55f9663ddb53895101a74addd3478b9cb5", 0x55, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:39 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) faccessat(r1, &(0x7f00000003c0)='./file0\x00', 0x90) 12:40:39 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:39 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:39 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:39 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:39 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:40 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) faccessat(r1, &(0x7f00000003c0)='./file0\x00', 0x90) 12:40:40 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) openat$incfs(r0, &(0x7f0000000300)='.pending_reads\x00', 0x8534a12e67a1e092, 0x1a0) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:40 executing program 1: clock_nanosleep(0x7, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) 12:40:40 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:40 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000240)={0x4006, 0xfffffff9, 0x2, 0x7}) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:40 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) 12:40:40 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) 12:40:40 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:40 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:40 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:40 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) 12:40:40 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:40 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:40 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) 12:40:41 executing program 1: clock_nanosleep(0x7, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) 12:40:41 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:41 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:41 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:41 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) 12:40:41 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) 12:40:41 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:41 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:41 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:41 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:41 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:41 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) 12:40:42 executing program 1: clock_nanosleep(0x7, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) 12:40:42 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) 12:40:42 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:42 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:42 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:42 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) 12:40:42 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:42 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:42 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:42 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:42 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) 12:40:42 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) 12:40:43 executing program 1: clock_nanosleep(0x7, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) read$snapshot(0xffffffffffffffff, &(0x7f00000000c0)=""/50, 0x32) 12:40:43 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:43 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:43 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) 12:40:43 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:43 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) 12:40:43 executing program 0: mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) 12:40:43 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) 12:40:43 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r3, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:43 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:43 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:43 executing program 0: mknodat(0xffffffffffffffff, 0x0, 0x40, 0xffffffff) 12:40:44 executing program 1: clock_nanosleep(0x7, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) read$snapshot(0xffffffffffffffff, &(0x7f00000000c0)=""/50, 0x32) 12:40:44 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) 12:40:44 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r3, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:44 executing program 0: mknodat(0xffffffffffffffff, 0x0, 0x0, 0xffffffff) 12:40:44 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:44 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:44 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r2, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:44 executing program 0: mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:40:44 executing program 2: openat$nvram(0xffffffffffffff9c, 0x0, 0x218840, 0x0) 12:40:44 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:44 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:44 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:45 executing program 1: clock_nanosleep(0x7, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) read$snapshot(0xffffffffffffffff, &(0x7f00000000c0)=""/50, 0x32) 12:40:45 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:45 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:45 executing program 2: openat$nvram(0xffffffffffffff9c, 0x0, 0x218840, 0x0) 12:40:45 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:45 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) 12:40:45 executing program 2: openat$nvram(0xffffffffffffff9c, 0x0, 0x218840, 0x0) 12:40:45 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:45 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:45 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x0, 0x0) 12:40:45 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:45 executing program 0: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:45 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) 12:40:45 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:45 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x0, 0x0) 12:40:45 executing program 3: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:45 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:45 executing program 0: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x0, 0x0) 12:40:46 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) 12:40:46 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 2: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400100, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000200)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @dev={[], 0x17}}, 0x14) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) 12:40:46 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) 12:40:46 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) 12:40:46 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000140)=""/100, 0x64) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="9bade3fde9a96f820761c38fbdfabcb65e54895ec89f8c267f1047cba6e7775bb2fa73c666a23d09fdc4e1f7bdf1f59e347358aa834ee0386d115ef14e5b1037bd8d07c7b0228302803a765451ba539442cca699e7be17d2e0dda8d4dd15fb73d4faf213e6283a3facbd2a0b22f849159f8c6d5d97e9a01d986379d580638e077a6f8e9949e482c84dff2b2408938590deaf8c8d27b90b", 0x97, 0x8}], 0x4, &(0x7f0000000280)={[{'\'\xed:^'}, {'-\x93\xc7+]'}, {}, {'/\xa3'}, {'\xc1:+&'}, {'/'}, {'&^\'\\{{'}], [{@fsmagic={'fsmagic'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '2^&'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x218840, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000380)={0x4005, 0x1f, 0xd9cd, 0x4}) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40, 0xffffffff) 12:40:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) read$snapshot(r0, &(0x7f00000000c0)=""/50, 0x32) 12:40:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f00000000c0)=""/50, 0x32) 12:40:46 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f00000000c0)=""/50, 0x32) 12:40:46 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f00000000c0)=""/50, 0x32) 12:40:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, &(0x7f0000000380)) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) 12:40:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0), 0x0, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 2: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000008c0)="470213972f935e5c58090ad957d6f1930156bd66e544d37e81d59b7b02939d13222ac4ecf17f288af2f582d69c0a515f5e0bd4a19259131cf9db9eacefebbe38c3914c48a6291b5270020fa642419671860dfcca7cc5a03982f48182aae90b1d8866ad89298b5e1a8a6c6aad577407e86a51fce94774093f97f910275d3e5d25339f30ea4f63e89eabbcbf9ea3bda22ef909c45faa356c48759246632ba90ffa2f9b1690d7cf542a01a039a2a893cc1383b339665de8439af6b736dcc781bdaab2952252e3c2a35a5bda0818652f55a0f25c7ab63c4627f3a70ee838cefaf020f29be0eb9d56cb32ec5cd0cd5b16d7", 0xef, 0x5}, {&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:46 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:46 executing program 5: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, 0x0) 12:40:46 executing program 1: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:47 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000002c0)={0xbd}) 12:40:47 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:47 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x2108482, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, 0x0) 12:40:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101002, 0x0) read$snapshot(r0, &(0x7f0000000040)=""/181, 0xb5) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000100)={0x2, 0x5}) 12:40:47 executing program 5: times(&(0x7f0000000000)) 12:40:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, 0x0) 12:40:47 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, 0x0) 12:40:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, 0x0) 12:40:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101002, 0x0) read$snapshot(r0, &(0x7f0000000040)=""/181, 0xb5) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000100)={0x2, 0x5}) 12:40:47 executing program 5: times(&(0x7f0000000000)) 12:40:47 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, 0x0) 12:40:47 executing program 4: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, 0x0) 12:40:47 executing program 0: syz_mount_image$omfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000002c0)='E', 0x1, 0x8002}, {&(0x7f0000000580)='=', 0x1, 0xffffffffffffffc0}], 0x0, &(0x7f00000009c0)={[{}, {'\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}, {}, {'[(\xd6&'}, {}, {'@'}], [{@smackfshat={'smackfshat', 0x3d, '\xb1\xb2NE\x88n\xf1bdlI\a\x9a\xae\xee\xa3h}\xb9H\xcbo\x94BQ\xd30\x92\xeb\xf7\r\x87\xeb\x03\xd3\xb7\xe5J&\xc0M\xed(\xcbL\x82Wp\r\x16\x99u\x88V4L,\xc8\x03j|\x94\\\xe0\xe4\xed1\x9fxo\x82/\x7f\x14(\xab\xbf\x10\xc0:\x83L.3L\x04d\xadZ3Nq\x95\xe4\x90\x8fB\xae&z\xa2\xb0l\x827Z\x95\xac\fV\'\xfd\'(FT\xc12Kk\x05\xc9\xbbM\xd6\x9cli\xd7\x88\xec.\x1b\xe4\x87\x98W\xae\x97\xc5\x9b?O\xfb\xca\xf5?\"\xbf\xfd\x02\x01\x14\xa6\xfa\xb7\xe7\xdavj\\\x8d\x1d)\xb7+\xdde\x89\xef\x12\x8fD\x98\xe66\xc6\x17g-\x96\xa8\x91\xcd%\x88?Z\xa1\xa9\xf3\xc9\x18#\xce\xa6K7\x9f\xd2\xf8\xccW\xbf1\x8f\x84\x99'}}, {@fsname={'fsname', 0x3d, 'omfs\x00'}}]}) 12:40:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000002c0)) 12:40:47 executing program 5: times(&(0x7f0000000000)) 12:40:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101002, 0x0) read$snapshot(r0, &(0x7f0000000040)=""/181, 0xb5) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000100)={0x2, 0x5}) 12:40:47 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, 0x0) 12:40:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, 0x0) 12:40:47 executing program 0: write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000080)='connect aa:aa:aa:aa:aa:11 0', 0x1b) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') 12:40:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) 12:40:47 executing program 5: times(0x0) 12:40:47 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101002, 0x0) read$snapshot(r0, &(0x7f0000000040)=""/181, 0xb5) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r1, 0x0, 0x0) 12:40:47 executing program 4: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) 12:40:47 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, r1) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 12:40:47 executing program 5: times(0x0) 12:40:47 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101002, 0x0) read$snapshot(r0, &(0x7f0000000040)=""/181, 0xb5) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) 12:40:47 executing program 4: times(0x0) 12:40:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) 12:40:47 executing program 5: times(0x0) 12:40:47 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:47 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, r1) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 12:40:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101002, 0x0) read$snapshot(r0, &(0x7f0000000040)=""/181, 0xb5) 12:40:47 executing program 3: ioctl$SNAPSHOT_CREATE_IMAGE(0xffffffffffffffff, 0x40043311, &(0x7f0000000040)) 12:40:47 executing program 4: times(0x0) 12:40:47 executing program 5: socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x182, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r1, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, [], 0x23}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44000}, 0x24000) 12:40:47 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) keyctl$link(0x8, 0x0, 0x0) 12:40:47 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, r1) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 12:40:47 executing program 3: ioctl$SNAPSHOT_CREATE_IMAGE(0xffffffffffffffff, 0x40043311, &(0x7f0000000040)) 12:40:47 executing program 4: times(0x0) 12:40:47 executing program 2: read$snapshot(0xffffffffffffffff, &(0x7f0000000040)=""/181, 0xb5) 12:40:48 executing program 5: socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x182, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r1, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, [], 0x23}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44000}, 0x24000) 12:40:48 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) keyctl$link(0x8, 0x0, 0x0) 12:40:48 executing program 3: ioctl$SNAPSHOT_CREATE_IMAGE(0xffffffffffffffff, 0x40043311, &(0x7f0000000040)) 12:40:48 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xa1, 0xffffffff, "dbbf513b67766d01c03fa994ce3beec71bbdf278e8ac00a804ced04c6121d80185633e7d1c1aa9dcc4a79d3a031cff040ca7c30d1397b70f68c186c2b5a17b9d0f6c7e1a0f034f371cffb2ae1487eea2e4c974a56a1d9aabc3316bb4e7d9866d33a85b6c10c81d36116e5a27bb3a9fee086a90f9612b9896b8426ef4e4fa452bcf5d724de34eb90f4aeab83736133936ec84ff59965e652430"}, &(0x7f0000000140), 0x1000) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{r1, r2/1000+60000}, {0x0, 0x2710}}) 12:40:48 executing program 2: read$snapshot(0xffffffffffffffff, 0x0, 0x0) 12:40:48 executing program 5: socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x182, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r1, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, [], 0x23}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44000}, 0x24000) 12:40:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, r1) 12:40:48 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) 12:40:48 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) 12:40:48 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xa1, 0xffffffff, "dbbf513b67766d01c03fa994ce3beec71bbdf278e8ac00a804ced04c6121d80185633e7d1c1aa9dcc4a79d3a031cff040ca7c30d1397b70f68c186c2b5a17b9d0f6c7e1a0f034f371cffb2ae1487eea2e4c974a56a1d9aabc3316bb4e7d9866d33a85b6c10c81d36116e5a27bb3a9fee086a90f9612b9896b8426ef4e4fa452bcf5d724de34eb90f4aeab83736133936ec84ff59965e652430"}, &(0x7f0000000140), 0x1000) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{r1, r2/1000+60000}, {0x0, 0x2710}}) 12:40:48 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) keyctl$link(0x8, 0x0, 0x0) 12:40:48 executing program 5: socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x182, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r1, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, [], 0x23}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44000}, 0x24000) 12:40:48 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:48 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) 12:40:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) 12:40:48 executing program 5: socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x182, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') 12:40:48 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) 12:40:48 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xa1, 0xffffffff, "dbbf513b67766d01c03fa994ce3beec71bbdf278e8ac00a804ced04c6121d80185633e7d1c1aa9dcc4a79d3a031cff040ca7c30d1397b70f68c186c2b5a17b9d0f6c7e1a0f034f371cffb2ae1487eea2e4c974a56a1d9aabc3316bb4e7d9866d33a85b6c10c81d36116e5a27bb3a9fee086a90f9612b9896b8426ef4e4fa452bcf5d724de34eb90f4aeab83736133936ec84ff59965e652430"}, &(0x7f0000000140), 0x1000) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{r1, r2/1000+60000}, {0x0, 0x2710}}) 12:40:48 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) 12:40:48 executing program 1: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:48 executing program 5: socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x182, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) 12:40:48 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) 12:40:48 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(0xffffffffffffffff, 0x40043311, &(0x7f0000000040)) 12:40:48 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xa1, 0xffffffff, "dbbf513b67766d01c03fa994ce3beec71bbdf278e8ac00a804ced04c6121d80185633e7d1c1aa9dcc4a79d3a031cff040ca7c30d1397b70f68c186c2b5a17b9d0f6c7e1a0f034f371cffb2ae1487eea2e4c974a56a1d9aabc3316bb4e7d9866d33a85b6c10c81d36116e5a27bb3a9fee086a90f9612b9896b8426ef4e4fa452bcf5d724de34eb90f4aeab83736133936ec84ff59965e652430"}, &(0x7f0000000140), 0x1000) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) clock_gettime(0x0, &(0x7f00000001c0)) 12:40:48 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) 12:40:48 executing program 1: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:48 executing program 0: keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0) 12:40:48 executing program 5: socket$inet_sctp(0x2, 0x2dd1a93e26360e5c, 0x84) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x182, 0x0) 12:40:48 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(0xffffffffffffffff, 0x40043311, &(0x7f0000000040)) 12:40:48 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) 12:40:48 executing program 0: keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0) 12:40:48 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xa1, 0xffffffff, "dbbf513b67766d01c03fa994ce3beec71bbdf278e8ac00a804ced04c6121d80185633e7d1c1aa9dcc4a79d3a031cff040ca7c30d1397b70f68c186c2b5a17b9d0f6c7e1a0f034f371cffb2ae1487eea2e4c974a56a1d9aabc3316bb4e7d9866d33a85b6c10c81d36116e5a27bb3a9fee086a90f9612b9896b8426ef4e4fa452bcf5d724de34eb90f4aeab83736133936ec84ff59965e652430"}, &(0x7f0000000140), 0x1000) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:48 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x182, 0x0) 12:40:48 executing program 1: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:48 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(0xffffffffffffffff, 0x40043311, &(0x7f0000000040)) 12:40:48 executing program 5: openat$nvram(0xffffffffffffff9c, 0x0, 0x182, 0x0) 12:40:48 executing program 0: keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0) 12:40:48 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) 12:40:48 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:48 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000100)='trusted\x00', 0x0, 0x0) 12:40:48 executing program 5: openat$nvram(0xffffffffffffff9c, 0x0, 0x182, 0x0) 12:40:48 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, 0x0) 12:40:48 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:48 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:48 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) 12:40:48 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000100)='trusted\x00', 0x0, 0x0) 12:40:48 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:48 executing program 5: openat$nvram(0xffffffffffffff9c, 0x0, 0x182, 0x0) 12:40:48 executing program 3: keyctl$search(0xa, 0x0, &(0x7f0000000100)='trusted\x00', 0x0, 0x0) 12:40:48 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:48 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) 12:40:48 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:48 executing program 3: keyctl$search(0xa, 0x0, &(0x7f0000000100)='trusted\x00', 0x0, 0x0) 12:40:48 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000100)='trusted\x00', 0x0, 0x0) 12:40:49 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) 12:40:49 executing program 4: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 3: keyctl$search(0xa, 0x0, &(0x7f0000000100)='trusted\x00', 0x0, 0x0) 12:40:49 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:49 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) 12:40:49 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) 12:40:49 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:49 executing program 4: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) 12:40:49 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) 12:40:49 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:49 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x100) 12:40:49 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) 12:40:49 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) 12:40:49 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) 12:40:49 executing program 4: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x100) 12:40:49 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) 12:40:49 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x100) 12:40:49 executing program 3: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x100) 12:40:49 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) 12:40:49 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) 12:40:49 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', 0x0, 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) 12:40:49 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) 12:40:49 executing program 3: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x100) 12:40:49 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r1, 0x330f, 0x100) 12:40:49 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) 12:40:49 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x100) 12:40:49 executing program 3: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r1, 0x330f, 0x100) 12:40:49 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) 12:40:49 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', 0x0, 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) 12:40:49 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x100) 12:40:49 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) 12:40:49 executing program 0: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', 0x0, 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 3: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r1, 0x330f, 0x100) 12:40:49 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) 12:40:49 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) 12:40:49 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) 12:40:49 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x100) 12:40:49 executing program 0: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:49 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) 12:40:50 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) 12:40:50 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x100) 12:40:50 executing program 3: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) 12:40:50 executing program 0: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) 12:40:50 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:50 executing program 3: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) 12:40:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x100) 12:40:50 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', 0x0, 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x100) 12:40:50 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:50 executing program 3: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) 12:40:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x100) 12:40:50 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:50 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', 0x0, 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) 12:40:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x100) 12:40:50 executing program 3: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x100) 12:40:50 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:50 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, 0x0) 12:40:50 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) 12:40:50 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', 0x0, 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x100) 12:40:50 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:50 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) 12:40:50 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, 0x0) 12:40:50 executing program 3: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) 12:40:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x100) 12:40:50 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x100) 12:40:50 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) 12:40:50 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, 0x0) 12:40:50 executing program 3: arch_prctl$ARCH_SET_GS(0x1001, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x100) 12:40:50 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:50 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) 12:40:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x0) 12:40:50 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:50 executing program 3: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:50 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, &(0x7f00000003c0)={[], [{@permit_directio='permit_directio'}]}) 12:40:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:51 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xa1, 0xffffffff, "dbbf513b67766d01c03fa994ce3beec71bbdf278e8ac00a804ced04c6121d80185633e7d1c1aa9dcc4a79d3a031cff040ca7c30d1397b70f68c186c2b5a17b9d0f6c7e1a0f034f371cffb2ae1487eea2e4c974a56a1d9aabc3316bb4e7d9866d33a85b6c10c81d36116e5a27bb3a9fee086a90f9612b9896b8426ef4e4fa452bcf5d724de34eb90f4aeab83736133936ec84ff59965e652430"}, &(0x7f0000000140), 0x1000) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) clock_gettime(0x0, &(0x7f00000001c0)) 12:40:51 executing program 3: keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0) 12:40:51 executing program 4: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, &(0x7f00000003c0)) 12:40:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:51 executing program 3: keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0) 12:40:51 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xa1, 0xffffffff, "dbbf513b67766d01c03fa994ce3beec71bbdf278e8ac00a804ced04c6121d80185633e7d1c1aa9dcc4a79d3a031cff040ca7c30d1397b70f68c186c2b5a17b9d0f6c7e1a0f034f371cffb2ae1487eea2e4c974a56a1d9aabc3316bb4e7d9866d33a85b6c10c81d36116e5a27bb3a9fee086a90f9612b9896b8426ef4e4fa452bcf5d724de34eb90f4aeab83736133936ec84ff59965e652430"}, &(0x7f0000000140), 0x1000) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) clock_gettime(0x0, &(0x7f00000001c0)) 12:40:51 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:51 executing program 3: keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0) 12:40:51 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, 0x0) 12:40:51 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:51 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xa1, 0xffffffff, "dbbf513b67766d01c03fa994ce3beec71bbdf278e8ac00a804ced04c6121d80185633e7d1c1aa9dcc4a79d3a031cff040ca7c30d1397b70f68c186c2b5a17b9d0f6c7e1a0f034f371cffb2ae1487eea2e4c974a56a1d9aabc3316bb4e7d9866d33a85b6c10c81d36116e5a27bb3a9fee086a90f9612b9896b8426ef4e4fa452bcf5d724de34eb90f4aeab83736133936ec84ff59965e652430"}, &(0x7f0000000140), 0x1000) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) clock_gettime(0x0, &(0x7f00000001c0)) 12:40:51 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:51 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, 0x0) 12:40:51 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) 12:40:51 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 4: keyctl$link(0x8, 0x0, 0x0) 12:40:51 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xa1, 0xffffffff, "dbbf513b67766d01c03fa994ce3beec71bbdf278e8ac00a804ced04c6121d80185633e7d1c1aa9dcc4a79d3a031cff040ca7c30d1397b70f68c186c2b5a17b9d0f6c7e1a0f034f371cffb2ae1487eea2e4c974a56a1d9aabc3316bb4e7d9866d33a85b6c10c81d36116e5a27bb3a9fee086a90f9612b9896b8426ef4e4fa452bcf5d724de34eb90f4aeab83736133936ec84ff59965e652430"}, &(0x7f0000000140), 0x1000) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:51 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, 0x0) 12:40:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 12:40:51 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:51 executing program 4: keyctl$link(0x8, 0x0, 0x0) 12:40:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, &(0x7f00000003c0)={[], [{@permit_directio='permit_directio'}]}) 12:40:51 executing program 4: keyctl$link(0x8, 0x0, 0x0) 12:40:51 executing program 3: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, 0x0) 12:40:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 12:40:51 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80080, 0x100) syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:51 executing program 0: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, &(0x7f00000003c0)) 12:40:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 12:40:51 executing program 4: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:51 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 12:40:51 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, r1) 12:40:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 4: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:51 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) 12:40:51 executing program 2: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:51 executing program 0: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x4, 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x15d801, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r1, 0x8008330e, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x100) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) 12:40:51 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80400, 0x0) connect$packet(r0, &(0x7f0000000040)={0x11, 0x1b, 0x0, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x1c0) 12:40:51 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:51 executing program 4: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:52 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:52 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f0000000080)) getdents64(r0, 0x0, 0x16) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0xffffefff, @private0={0xfc, 0x0, [], 0x1}, 0x6c}], 0x2c) 12:40:52 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80400, 0x0) connect$packet(r0, &(0x7f0000000040)={0x11, 0x1b, 0x0, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x1c0) 12:40:52 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:52 executing program 2: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:52 executing program 0: socket$inet_sctp(0x2, 0x1, 0x84) 12:40:52 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:52 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) arch_prctl$ARCH_SET_GS(0x1001, 0x0) 12:40:52 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80400, 0x0) connect$packet(r0, &(0x7f0000000040)={0x11, 0x1b, 0x0, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x1c0) 12:40:52 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:52 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) arch_prctl$ARCH_SET_GS(0x1001, 0x0) 12:40:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 12:40:52 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80400, 0x0) connect$packet(r0, &(0x7f0000000040)={0x11, 0x1b, 0x0, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x1c0) 12:40:52 executing program 0: socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, &(0x7f00000000c0)) 12:40:52 executing program 2: syz_mount_image$omfs(0x0, &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:52 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) arch_prctl$ARCH_SET_GS(0x1001, 0x0) 12:40:52 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x30}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 12:40:52 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) 12:40:52 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80400, 0x0) connect$packet(r0, &(0x7f0000000040)={0x11, 0x1b, 0x0, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) arch_prctl$ARCH_SET_GS(0x1001, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1c0) 12:40:52 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 12:40:52 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) 12:40:52 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:52 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', 0x0, 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f00000000c0)={0x4, 0x8001, 0x0, 0x7, 0x1f, 0xfe, 0x0, 0xf7, 0x4, 0x1, 0x3, "8086305c634d63274e226a53dffe4fda426ad589943413ea22e994827376a15c"}) r1 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) recvfrom$packet(r1, &(0x7f0000000440)=""/4096, 0x1000, 0x30, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) 12:40:52 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80400, 0x0) connect$packet(r0, &(0x7f0000000040)={0x11, 0x1b, 0x0, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) fchmodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1c0) 12:40:52 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:52 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x200000, 0x0) 12:40:52 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:52 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', 0x0, 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:52 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80400, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1c0) 12:40:52 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r1, r1, 0x4, r2}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r3, 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r3, 0x40043311, &(0x7f0000000340)) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000140)={0x0, &(0x7f00000000c0)=[&(0x7f0000000040)="efad304254ea095ac3b0c59f64e5f344b9cc0b67a8b001d00e1ad7fa6a14596bccb5d3839c14323581cfbb7fe06e9578078f50f4bc6f5f22fa91c336cc082994016b21f07e"]}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) 12:40:52 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x200000, 0x0) 12:40:52 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', 0x0, 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:52 executing program 3: fchmodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1c0) 12:40:53 executing program 0: write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x13f, 0x9}}, 0x20) r0 = syz_mount_image$omfs(&(0x7f0000000080)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x9, &(0x7f00000024c0)=[{&(0x7f0000000140)="2501e94ac0e1c595b7030a5e8bdf39e213a48c8da3c993c29dc2e2cb37d4af86e7f19a1c0267a64f006265b1c6564b7414b16712de71bb65e725f774e492e203bb0d35585d1aaed061aaccf3eac742555871df3bd17f421e1501670c0ad332f4c93bf1d5bf3f291ceef3094b762999519bc7d927fb29a976fa38d18104a76bb0dbb0d5", 0x83, 0x3}, {&(0x7f0000000200)="b20e5a4e2e916d", 0x7, 0x2}, {&(0x7f0000000240)="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", 0x1000, 0x1ff}, {&(0x7f0000001240)="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", 0x1000, 0x1800000}, {&(0x7f0000002240)="984cf44dfeefaf5ac16deb5a38585ac3dde6e0afcef1579c4b8563a531c0f7050e1a", 0x22, 0x1}, {&(0x7f0000002280), 0x0, 0x6}, {&(0x7f00000022c0)="9c44d9dcdb918da6210865094634f1e0ef1f7ced3a5466f35fa6bdabebee36a974aeb729bec6b1b8d1927de2509c6a004d0db5a0c8563f18cf301872f9583c1c3be5fa91a28298e02cb3b04629136831a082687c4871ce4cd5dfe19440633a30596c101cf85ec355ac7b3ab749e61136b8fb70243ebf3b360a7dcdd920c814def81a2670547f0042401d697a8ce6c3c7ac73f1", 0x93, 0xb48a}, {&(0x7f0000002380)="15e8fd6087ab0f9028218591d7f1263e9d2f50554a112004b26c9677a9ca91862bd58c9014f3ba3bffd38660edab61c46de9844465ad60a3fa96319a127f49124163ca52bfe0f0b0648f544c1c10d468801206d2f28ef19cef876e52b00719", 0x5f, 0x9}, {&(0x7f0000002400)="24a2e6f5f3142d839488c02a40cf85213013fd3a9a6001109511c6de4572d00b3d4a950c5bcdcd562bb3c764f4b3bc6e30205484fce77dc4a54d7b92c8a9ec75c7eb50b3243f32d80bd04bb42a9f19a96555804955881a25745ec541417a533c1fb7f6b3b965ce6c615b1a8e1348a6e1095b17ab1c0efef7d01238656a24c2768ab26b6078824cee13", 0x89, 0x5}], 0x414, &(0x7f00000025c0)={[{':-^&\')'}, {'@'}], [{@obj_user={'obj_user', 0x3d, '+['}}, {@fowner_gt={'fowner>'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@uid_gt={'uid>', 0xee01}}]}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000002700)={@desc={0x1, 0x0, @desc1='\x00\x00\x11\x11\"\"33'}}) name_to_handle_at(r0, &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)={0x40, 0x800, "e6ecf1facebe54e81074725854dc3ff6f2def844dc24ea488309578339b1131c296e5778fc4a0c7c99bbadaced4d942fbd94e14413b6cff9"}, &(0x7f00000026c0), 0x1000) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) mkdirat(r2, &(0x7f0000002280)='./file0\x00', 0x90) 12:40:53 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:53 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x200000, 0x0) 12:40:53 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="08bde67bab7f33edd4569b98d9fee3ffc98675e811c65621a7037f7de346a820a16cbe622276f90605c8dab3318c8a4900e357c43cb2e695e4c375611c7516e320873a0e7d6b80337bae2726251ad51d839eb1c0dfb536e9b33d492a1cc9c5816ede4548280620125db84563e921a5818a7f3032b31901ef80a44aa5f5a1ffd5736437158839f764c1612a7eb51216d49e39ea6608fffcacba", 0x99, 0x4}], 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:53 executing program 3: fchmodat(0xffffffffffffffff, 0x0, 0x1c0) 12:40:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r1, 0x80083314, &(0x7f0000000140)) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000200)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x2}}, 0x20) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000480)={r1, r1, 0x17}, 0x10) openat$incfs(r1, &(0x7f00000004c0)='.pending_reads\x00', 0xc0, 0x30) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r2}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000440)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) read$snapshot(r1, &(0x7f0000000240)=""/117, 0x75) 12:40:53 executing program 3: fchmodat(0xffffffffffffffff, 0x0, 0x0) 12:40:53 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 12:40:53 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) 12:40:53 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={0x7}, 0x4) r1 = socket$isdn(0x22, 0x3, 0x22) bind$isdn(r1, &(0x7f0000000080)={0x22, 0xf8, 0xf9, 0x3, 0x5}, 0x6) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f00000000c0)={0x4, 0x8001, 0x0, 0x7, 0x1f, 0xfe, 0x0, 0xf7, 0x4, 0x1, 0x3, "8086305c634d63274e226a53dffe4fda426ad589943413ea22e994827376a15c"}) r1 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) recvfrom$packet(r1, &(0x7f0000000440)=""/4096, 0x1000, 0x30, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) 12:40:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 12:40:53 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) 12:40:53 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 12:40:53 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:53 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) 12:40:53 executing program 1: ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000040)={@id={0x2, 0x0, @a='i\xb2\xf6\xed\xee\xe7 \xcc\xe0Wy7\xeb\x8agQ'}}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) 12:40:53 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:53 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 12:40:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$l2tp6(0xa, 0x2, 0x73) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:53 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) 12:40:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_mount_image$omfs(&(0x7f0000000040)='omfs\x00', &(0x7f0000000080)='./file0\x00', 0x78d, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="5d297ece6b59f6b2018b73ed9a51f0ebb3d94b2fcad73add442e388ccae233537f52becad6e49dd19ef8e98fdabfacb976bf185a648a168147e03a35acfeace8735444d165dc96d7a3a966bd3d7a4471d212c164e198ed53c7cf443c14a686f63a41757e23898f052c5b8b978228f2a290b36976415262b8dcf4b900153e3dcb2db58798174f8a89afc8348af40f77f31c5fe8fab7131df5ae299b296253e64ba14414bb62e51b2fc338c232dca5f25aaac095a54e5f7ce924fb469dc8bd7c078810e9eca51877c714a947d05ad65e3550284a77799185361d193e4e1f12deb76d", 0xe1, 0x6}, {&(0x7f0000000240)="dae4ea9f6cbd86d4210d8778b83ef1f80cfb560bdbef203da215ada0269ada7be31d3dde171e7abd4418323d432f424b26ddb07e3be8d1e77ca5c62a0d1079fa2ec9a6180ddd8fff0b6006d0aa663f3ec341ea4230dda7b9418dbc2172ceb2212af4cad318acff217e095773d3117b46497a505d9ccc550b", 0x78, 0x8}], 0x1000, &(0x7f00000002c0)={[{']{'}, {'-/'}, {}, {'/dev/infiniband/rdma_cm\x00'}, {'/dev/infiniband/rdma_cm\x00'}, {'/dev/infiniband/rdma_cm\x00'}, {'/dev/infiniband/rdma_cm\x00'}, {'/'}, {'\'\\-$#)./)'}], [{@permit_directio='permit_directio'}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@uid_gt={'uid>', 0xee00}}, {@uid_eq={'uid', 0x3d, 0xee01}}]}) linkat(r1, &(0x7f00000003c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r4 = accept$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) getsockopt$packet_int(r4, 0x107, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0x4) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) renameat(r2, &(0x7f0000000480)='./file0\x00', r3, &(0x7f00000004c0)='./file0\x00') r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) ioctl$SNAPSHOT_FREE(r5, 0x3305) 12:40:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f00000000c0)={0x4, 0x8001, 0x0, 0x7, 0x1f, 0xfe, 0x0, 0xf7, 0x4, 0x1, 0x3, "8086305c634d63274e226a53dffe4fda426ad589943413ea22e994827376a15c"}) r1 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) recvfrom$packet(r1, &(0x7f0000000440)=""/4096, 0x1000, 0x30, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) 12:40:54 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r1, r1, 0x4, r2}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r3, 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r3, 0x40043311, &(0x7f0000000340)) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000140)={0x0, &(0x7f00000000c0)=[&(0x7f0000000040)="efad304254ea095ac3b0c59f64e5f344b9cc0b67a8b001d00e1ad7fa6a14596bccb5d3839c14323581cfbb7fe06e9578078f50f4bc6f5f22fa91c336cc082994016b21f07e"]}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) 12:40:54 executing program 5 (fault-call:0 fault-nth:0): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) 12:40:54 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{'\\\a&}'}], [{@permit_directio='permit_directio'}]}) 12:40:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$packet(0x11, 0x3, 0x300) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) r3 = openat$incfs(r1, &(0x7f0000000240)='.log\x00', 0x80000, 0x11) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, r1, 0x0, r3}, 0x10) 12:40:54 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) [ 660.082775] FAULT_INJECTION: forcing a failure. [ 660.082775] name failslab, interval 1, probability 0, space 0, times 0 [ 660.107576] CPU: 1 PID: 15017 Comm: syz-executor.5 Not tainted 4.14.214-syzkaller #0 [ 660.115492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.124847] Call Trace: [ 660.127442] dump_stack+0x1b2/0x283 12:40:54 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, 0x0) 12:40:54 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, 0x0) [ 660.131079] should_fail.cold+0x10a/0x154 [ 660.140446] should_failslab+0xd6/0x130 [ 660.144427] kmem_cache_alloc+0x28e/0x3c0 [ 660.148574] getname_flags+0xc8/0x550 [ 660.152380] do_sys_open+0x1ce/0x410 [ 660.156096] ? filp_open+0x60/0x60 [ 660.159637] ? __do_page_fault+0x159/0xad0 [ 660.163868] ? do_syscall_64+0x4c/0x640 [ 660.167840] ? SyS_open+0x30/0x30 [ 660.171297] do_syscall_64+0x1d5/0x640 [ 660.175192] entry_SYSCALL_64_after_hwframe+0x46/0xbb 12:40:54 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, 0x0) 12:40:54 executing program 5 (fault-call:0 fault-nth:1): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) 12:40:54 executing program 4 (fault-call:1 fault-nth:0): r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) [ 660.180375] RIP: 0033:0x45e219 [ 660.183555] RSP: 002b:00007f1b60084c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 660.191259] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 660.198534] RDX: 0000000000200000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 660.205803] RBP: 00007f1b60084ca0 R08: 0000000000000000 R09: 0000000000000000 [ 660.213068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 660.220336] R13: 00007ffe39ec664f R14: 00007f1b600859c0 R15: 000000000119bf8c [ 660.269326] FAULT_INJECTION: forcing a failure. [ 660.269326] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 660.281153] CPU: 1 PID: 15044 Comm: syz-executor.5 Not tainted 4.14.214-syzkaller #0 [ 660.289133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.298494] Call Trace: [ 660.301086] dump_stack+0x1b2/0x283 [ 660.304722] should_fail.cold+0x10a/0x154 [ 660.308877] __alloc_pages_nodemask+0x22c/0x2720 [ 660.313638] ? __lock_acquire+0x5fc/0x3f20 12:40:54 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, &(0x7f00000003c0)={[], [{@permit_directio='permit_directio'}]}) [ 660.317874] ? mark_held_locks+0xa6/0xf0 [ 660.321941] ? _raw_spin_unlock_irq+0x24/0x80 [ 660.326437] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 660.331282] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 660.336300] ? _raw_spin_unlock_irq+0x5a/0x80 [ 660.340803] ? __schedule+0x893/0x1de0 [ 660.344689] ? mark_held_locks+0xa6/0xf0 [ 660.348750] ? retint_kernel+0x2d/0x2d [ 660.352645] cache_grow_begin+0x91/0x630 [ 660.356713] ? check_preemption_disabled+0x35/0x240 [ 660.361729] cache_alloc_refill+0x273/0x350 [ 660.366056] kmem_cache_alloc+0x333/0x3c0 [ 660.370205] getname_flags+0xc8/0x550 [ 660.374008] do_sys_open+0x1ce/0x410 [ 660.377720] ? filp_open+0x60/0x60 [ 660.381261] ? __do_page_fault+0x159/0xad0 [ 660.385497] ? do_syscall_64+0x4c/0x640 [ 660.389471] ? SyS_open+0x30/0x30 [ 660.392927] do_syscall_64+0x1d5/0x640 [ 660.396819] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 660.402009] RIP: 0033:0x45e219 [ 660.405193] RSP: 002b:00007f1b60084c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 660.412897] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 660.420257] RDX: 0000000000200000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 660.427526] RBP: 00007f1b60084ca0 R08: 0000000000000000 R09: 0000000000000000 [ 660.434789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 660.442040] R13: 00007ffe39ec664f R14: 00007f1b600859c0 R15: 000000000119bf8c 12:40:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f00000000c0)={0x4, 0x8001, 0x0, 0x7, 0x1f, 0xfe, 0x0, 0xf7, 0x4, 0x1, 0x3, "8086305c634d63274e226a53dffe4fda426ad589943413ea22e994827376a15c"}) r1 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) recvfrom$packet(r1, &(0x7f0000000440)=""/4096, 0x1000, 0x30, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) 12:40:55 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) fchmodat(0xffffffffffffffff, 0x0, 0x0) keyctl$link(0x8, 0x0, r0) keyctl$negate(0xd, r0, 0x8000, r0) 12:40:55 executing program 2: syz_mount_image$omfs(&(0x7f0000000240)='omfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, &(0x7f00000003c0)) 12:40:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:55 executing program 5 (fault-call:0 fault-nth:2): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) 12:40:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000002c0)={{0x2, 0x3, 0x7, 0x3, 0x6}, 0x3, 0x0, 0x7}) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) [ 660.947888] FAULT_INJECTION: forcing a failure. [ 660.947888] name failslab, interval 1, probability 0, space 0, times 0 [ 660.963788] CPU: 1 PID: 15072 Comm: syz-executor.5 Not tainted 4.14.214-syzkaller #0 [ 660.971687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.981042] Call Trace: [ 660.983632] dump_stack+0x1b2/0x283 [ 660.987265] should_fail.cold+0x10a/0x154 [ 660.991422] should_failslab+0xd6/0x130 12:40:55 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.log\x00', 0x0, 0xa) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)=0x40, 0x4) keyctl$link(0x8, 0x0, r0) [ 660.995407] kmem_cache_alloc_trace+0x29a/0x3d0 [ 661.000080] apparmor_file_alloc_security+0x129/0x800 [ 661.005272] security_file_alloc+0x66/0xa0 [ 661.009511] ? selinux_is_enabled+0x5/0x50 [ 661.013750] get_empty_filp+0x15c/0x3e0 [ 661.017722] path_openat+0x84/0x2970 [ 661.021433] ? get_pid_task+0x91/0x130 [ 661.025320] ? path_lookupat+0x780/0x780 [ 661.029380] ? trace_hardirqs_on+0x10/0x10 [ 661.033623] do_filp_open+0x179/0x3c0 [ 661.037425] ? may_open_dev+0xe0/0xe0 [ 661.041228] ? __alloc_fd+0x1be/0x490 [ 661.045031] ? lock_downgrade+0x740/0x740 [ 661.049183] ? do_raw_spin_unlock+0x164/0x220 [ 661.053678] ? _raw_spin_unlock+0x29/0x40 [ 661.057823] ? __alloc_fd+0x1be/0x490 [ 661.061629] do_sys_open+0x296/0x410 [ 661.065343] ? filp_open+0x60/0x60 [ 661.068897] ? __do_page_fault+0x159/0xad0 [ 661.073150] ? do_syscall_64+0x4c/0x640 [ 661.077122] ? SyS_open+0x30/0x30 [ 661.080577] do_syscall_64+0x1d5/0x640 [ 661.084473] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 661.089662] RIP: 0033:0x45e219 12:40:55 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x17}, 0x48, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "dee6fdf5883656f8d19f1e0e91ca88b3369283c55e6c5d1bba62d0b4db8af8d3b871e013164d84723e3fe3299fd6ab05a33cb162cc2360c2096c6a7f3f33fddb", 0x16}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r2) 12:40:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$packet(0x11, 0x3, 0x300) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) r3 = openat$incfs(r1, &(0x7f0000000240)='.log\x00', 0x80000, 0x11) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, r1, 0x0, r3}, 0x10) 12:40:55 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x80) mmap$snddsp_control(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x10, r0, 0x83000000) keyctl$link(0x8, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 661.092856] RSP: 002b:00007f1b60084c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 661.100559] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 661.107829] RDX: 0000000000200000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 661.115097] RBP: 00007f1b60084ca0 R08: 0000000000000000 R09: 0000000000000000 [ 661.122365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 661.129725] R13: 00007ffe39ec664f R14: 00007f1b600859c0 R15: 000000000119bf8c 12:40:55 executing program 5 (fault-call:0 fault-nth:3): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) 12:40:55 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0x2}, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x12a, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 12:40:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000002c0)={{0x2, 0x3, 0x7, 0x3, 0x6}, 0x3, 0x0, 0x7}) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x80, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f0000000140)={0x0, 0x20, 0x7ffd, 0xd8, 0x8, 0x53, 0x7b2109fc, 0x0, 0x1, 0x81, 0x8, 0x5}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) setsockopt$packet_buf(r3, 0x107, 0x1, &(0x7f0000000300)="d1d07fda6f9154cc14295220f176e81b8d8575550ad562680a074ec0b88aea634b35c92c1c16fad5dbb5629d84b3b498bdc68dc8a8ba7c4d3f5fb771eff3a3000a3110c732178b6c795aaf8e4b14f8faf1a61104134016a7aaca737a47408486e580a03f", 0x64) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r4, 0x80083314, &(0x7f0000000380)) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x111}}, 0x20) r5 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r5, 0x40044145, &(0x7f0000000240)=0x9) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000280)={@id={0x2, 0x0, @b}, 0x10, 0x0, [], @d='abcdefghijklmnop'}) socket$packet(0x11, 0x2, 0x300) [ 661.225342] FAULT_INJECTION: forcing a failure. [ 661.225342] name failslab, interval 1, probability 0, space 0, times 0 [ 661.260211] CPU: 1 PID: 15107 Comm: syz-executor.5 Not tainted 4.14.214-syzkaller #0 [ 661.268127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.277483] Call Trace: [ 661.280075] dump_stack+0x1b2/0x283 [ 661.283708] should_fail.cold+0x10a/0x154 [ 661.287862] should_failslab+0xd6/0x130 [ 661.291840] kmem_cache_alloc_trace+0x29a/0x3d0 [ 661.296514] apparmor_file_alloc_security+0x129/0x800 [ 661.301711] security_file_alloc+0x66/0xa0 [ 661.305947] ? selinux_is_enabled+0x5/0x50 [ 661.310183] get_empty_filp+0x15c/0x3e0 [ 661.314154] path_openat+0x84/0x2970 [ 661.317868] ? get_pid_task+0x91/0x130 [ 661.321764] ? path_lookupat+0x780/0x780 12:40:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$packet(0x11, 0x3, 0x300) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) r3 = openat$incfs(r1, &(0x7f0000000240)='.log\x00', 0x80000, 0x11) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, r1, 0x0, r3}, 0x10) [ 661.325825] ? trace_hardirqs_on+0x10/0x10 [ 661.330068] do_filp_open+0x179/0x3c0 [ 661.333865] ? may_open_dev+0xe0/0xe0 [ 661.337661] ? __alloc_fd+0x1be/0x490 [ 661.341463] ? lock_downgrade+0x740/0x740 [ 661.345615] ? do_raw_spin_unlock+0x164/0x220 [ 661.350108] ? _raw_spin_unlock+0x29/0x40 [ 661.354255] ? __alloc_fd+0x1be/0x490 [ 661.358060] do_sys_open+0x296/0x410 [ 661.361775] ? filp_open+0x60/0x60 [ 661.365415] ? __do_page_fault+0x159/0xad0 [ 661.369648] ? do_syscall_64+0x4c/0x640 [ 661.373616] ? SyS_open+0x30/0x30 [ 661.377078] do_syscall_64+0x1d5/0x640 [ 661.380971] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 661.386155] RIP: 0033:0x45e219 [ 661.389338] RSP: 002b:00007f1b60084c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 661.397066] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 661.404353] RDX: 0000000000200000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 661.411641] RBP: 00007f1b60084ca0 R08: 0000000000000000 R09: 0000000000000000 [ 661.418902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 12:40:55 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x17}, 0x48, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "dee6fdf5883656f8d19f1e0e91ca88b3369283c55e6c5d1bba62d0b4db8af8d3b871e013164d84723e3fe3299fd6ab05a33cb162cc2360c2096c6a7f3f33fddb", 0x16}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r2) 12:40:55 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x38, 0x31, 0x34, 0x35, 0x64, 0x61, 0x50, 0x0, 0x33, 0x31, 0x39, 0x61, 0x62, 0x39, 0x31, 0x61]}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x800016}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='logon\x00') 12:40:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$packet(0x11, 0x3, 0x300) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) r3 = openat$incfs(r1, &(0x7f0000000240)='.log\x00', 0x80000, 0x11) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, r1, 0x0, r3}, 0x10) 12:40:55 executing program 5 (fault-call:0 fault-nth:4): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) [ 661.426186] R13: 00007ffe39ec664f R14: 00007f1b600859c0 R15: 000000000119bf8c 12:40:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x7, 0x7}) 12:40:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4}, 0xc) 12:40:56 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) keyctl$negate(0xd, r1, 0x5, r0) 12:40:56 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x17}, 0x48, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "dee6fdf5883656f8d19f1e0e91ca88b3369283c55e6c5d1bba62d0b4db8af8d3b871e013164d84723e3fe3299fd6ab05a33cb162cc2360c2096c6a7f3f33fddb", 0x16}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r2) 12:40:56 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x24a2c2, 0x0) 12:40:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$packet(0x11, 0x3, 0x300) bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) openat$incfs(r1, &(0x7f0000000240)='.log\x00', 0x80000, 0x11) 12:40:56 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x17}, 0x48, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "dee6fdf5883656f8d19f1e0e91ca88b3369283c55e6c5d1bba62d0b4db8af8d3b871e013164d84723e3fe3299fd6ab05a33cb162cc2360c2096c6a7f3f33fddb", 0x16}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r2) 12:40:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$SNAPSHOT_UNFREEZE(r2, 0x3302) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nvram\x00', 0x113702, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000000480)=""/31, &(0x7f00000004c0)=0x1f) 12:40:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0xffffffffffff0000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x430000, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r1, 0x3304) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r1, 0x330f, 0x2) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200) 12:40:56 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x0) keyctl$link(0x8, 0x0, r0) 12:40:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$packet(0x11, 0x3, 0x300) bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) 12:40:56 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x17}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "dee6fdf5883656f8d19f1e0e91ca88b3369283c55e6c5d1bba62d0b4db8af8d3b871e013164d84723e3fe3299fd6ab05a33cb162cc2360c2096c6a7f3f33fddb", 0x16}, 0x48, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) keyctl$link(0x8, r1, r1) 12:40:56 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000080), 0x8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x14401, 0x0) 12:40:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000001240)=0x100) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000001180), 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000011c0)={r2}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) ioctl$IMCTRLREQ(r3, 0x80044945, &(0x7f0000001140)={0x1, 0x3, 0x9, 0x2}) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000140)=""/4096, &(0x7f00000000c0)=0x1000) 12:40:56 executing program 4: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000300)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)='0000111122223333') statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x400, 0x40, &(0x7f00000001c0)) 12:40:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$packet(0x11, 0x3, 0x300) 12:40:56 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x17}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "dee6fdf5883656f8d19f1e0e91ca88b3369283c55e6c5d1bba62d0b4db8af8d3b871e013164d84723e3fe3299fd6ab05a33cb162cc2360c2096c6a7f3f33fddb", 0x16}, 0x48, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r1) 12:40:56 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4}, 0xc) 12:40:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') 12:40:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000100)={0xa, 0xfffffffffffffec2, 0xfa00, {r2}}, 0xc) 12:40:57 executing program 4: bind$isdn(0xffffffffffffffff, &(0x7f0000000100)={0x22, 0x7, 0x0, 0x1, 0x40}, 0x6) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x600002, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000180)=@req3={0x40, 0x201, 0x5, 0x80000001, 0x9, 0xfffffffc, 0xfffffffd}, 0x1c) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f00000001c0)={0x20, 0x80, 0x8000, 0x39}) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r3) 12:40:57 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x17}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "dee6fdf5883656f8d19f1e0e91ca88b3369283c55e6c5d1bba62d0b4db8af8d3b871e013164d84723e3fe3299fd6ab05a33cb162cc2360c2096c6a7f3f33fddb", 0x16}, 0x48, r0) keyctl$link(0x8, 0x0, 0x0) 12:40:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) 12:40:57 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000040)=0x4326) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) mmap$snddsp_control(&(0x7f0000ffc000/0x3000)=nil, 0x1000, 0x1000002, 0x40010, r1, 0x83000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) 12:40:57 executing program 0: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x241b, 0x149000) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:57 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x17}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "dee6fdf5883656f8d19f1e0e91ca88b3369283c55e6c5d1bba62d0b4db8af8d3b871e013164d84723e3fe3299fd6ab05a33cb162cc2360c2096c6a7f3f33fddb", 0x16}, 0x48, r0) keyctl$link(0x8, 0x0, 0x0) 12:40:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) 12:40:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:57 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000180)={0x0, "7c18e6718153d4225c35b583280a311ffc8a4dc4ad37328ab5587c0c32124695360f29f3c9d80249e4091c036b78915122ff7e024de87340ebcb4b5a62528da8", 0x20}, 0x48, r1) 12:40:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = add_key$fscrypt_v1(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000140)={0x0, "371863be0e3223eb4602c0c109f1f58b14404ac358d0c388c0552784fa8d9d393f3a2597cd5526e399e69958799e5fa96966d8619ac28bae6b09d5b5736df095", 0x22}, 0x48, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) keyctl$search(0xa, r1, &(0x7f00000000c0)='big_key\x00', &(0x7f00000001c0)={'syz', 0x0}, r2) 12:40:57 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x17}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "dee6fdf5883656f8d19f1e0e91ca88b3369283c55e6c5d1bba62d0b4db8af8d3b871e013164d84723e3fe3299fd6ab05a33cb162cc2360c2096c6a7f3f33fddb", 0x16}, 0x48, r0) keyctl$link(0x8, 0x0, 0x0) 12:40:57 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2d9c82, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0xd}}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r0}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x4000800) 12:40:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = syz_mount_image$omfs(&(0x7f0000000040)='omfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x8, &(0x7f00000015c0)=[{&(0x7f0000000140)="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", 0x1000, 0x5}, {&(0x7f0000001140)="85c0fcef635ff83d36bfd6f8f927bc5179e025b9fbc751a3018c4125e2dc9b7a4ec68b5f33c173692fcb26db606f3da7cb1f063bdcf35c727a8c64a0735b380b5a7b9acb008dccaf834663e08646213291c730f451023d287bbff3b877", 0x5d, 0x5}, {&(0x7f00000011c0)="348d8bf71007201805e2f41244d2f7e5dc79924944b85b407fee649c89715d86d66e0bec8ee8963b65f6f2bf8e8232b65d2c6fef5b47dd7ea8c483eb5286c272bb4fea19feb8951cf9794719970558ee5ee06878cdba4ab1e7f6e7a2564860f7a8d0b277d0a411187bb05c910cfe", 0x6e, 0x6}, {&(0x7f0000001240)="951f9df645712bc785c427d9d385202f22e215dbb48f1ef1f072af75f0fcbc332f19862144346fe5c8bc7c6549e142f6a37bd2500cc719325a16bd82419ed70639560a08d7bb527cf6cb87244751f0b972389f98e78251491e82702008c8165cc26828cb17e61421f3096706b1dc329da5b05d21424811f1a6574bed7bada264171ea6640ecd984a96df2ff30629b9188b64a12a89d32fb86da7e7cdb825aa7c8d999cf29a7f67", 0xa7, 0x4}, {&(0x7f0000001300)="c5006b4e96e753786ac78eeddd5574c02513a194a71be9a8a681b7799874611bb3fc043f049bde1f0827b2b646d9c0c6041caa293512a2d1265cc9c24539d08b607a4f3c2a9e5a1e8f098110d29e5a184d4edd6601bf1bc01fdb349bdc1dab844d5da5365526b5519c4c487d153d8bbe1204c03b8b66d41d06738337fa0cd832c6552ce3815a1515dc94e763276a98ee1cb2b20234b85ca5c9622bbc8a", 0x9d, 0x3f9c}, {&(0x7f00000000c0)="e0703c335badbc11094b0ad2646ee05675fefb7f05f9eee529b6ae5ecd38c2cbb5b7f3b45161b8b4ffd6eea5383baea0", 0x30, 0x9}, {&(0x7f00000013c0)="b8e3613a0f18cd215f46787050dbf744aa2a4659b0467dc50321f543ccdba840215476a269f90c2f414a866d0c901f35181852650bc1f2205fd2e66259ee6b2224436b76811bed3d1c3a6eb2abcb9ab1899673f0bcb7cf509afa922120ead465b7d70b3cc22f1807b416f954ae9ebecc19d018d68fbb1902f6a7016707e641aa46a735e419ccf7b1db4fa20eebf8088d9ae0943b24df19a9a0a3220fba396528a5bcca99dc3405adedb50ccc7296da7450ff809fddcb7841b76c24f5df0cf71c0fbfc1c4cb7de414edb1c753920fcd48f3e3971c7f2289e95df86534630c2e32dd412b2e20", 0xe5, 0xa8}, {&(0x7f00000014c0)="f5f5aa1859d03580116d31b07d7470199a42faaaa352c1f54503c8d329e8ab18fc4abdbe1db74518ef8973db3d44f774224834639d7ff8492eff174d3f78b3ede370567e17dfca3410f244623d8fd51241fc67b5be03c32d043a3151783dad476918c4885b8a1ce529bbd566d14de19ed1c46ba121d791e741a28053673a08eda3fa0f3464a5d9b4ca976e1ce7ad8087445c911a3b666d770f916cbe36ee445d5b01cf5a48ca8c35b5a0585d061ca65f59234197e4d43fbfbe38b1c756d95694f92b2cc267f4cfefd6d6d34a7ece11ac6665d5cb4fbcca7c2597d1c1ed35c87e6610695d9d27c68a99a534c9e5622fb0bb529551", 0xf4, 0xfffffffffffffff8}], 0x208014, &(0x7f0000001680)={[{'/dev/infiniband/rdma_cm\x00'}, {}, {}, {'/dev/infiniband/rdma_cm\x00'}, {':'}, {'/dev/infiniband/rdma_cm\x00'}, {}, {'/dev/infiniband/rdma_cm\x00'}, {'.#/&*\xa0^('}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000001700)={@desc={0x1, 0x0, @desc4='\x85\xba\xa1t\xf0\xcb\x11B'}}) 12:40:57 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x7, 0x33, 0x31, 0x63, 0x31, 0x30, 0x36, 0x31, 0x34, 0x38, 0x34, 0x7a, 0x0, 0x63, 0x36, 0x34]}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000100)=""/84) 12:40:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:57 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x17}, 0x48, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 12:40:57 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xba30ab981a131574, 0x0) ioctl$SNAPSHOT_UNFREEZE(r0, 0x3302) 12:40:57 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @auto=[0x30, 0x62, 0x52, 0x28, 0x62, 0x36, 0x58, 0x64, 0x35, 0x32, 0x64, 0x38, 0x35, 0x63, 0x64, 0x39]}, &(0x7f0000000180)={0x0, "5612e1cb632331052b68467302e5ac8ee1949c60a19ad3bedba092330968337193d93a4420ea2b18a05c2dc9606209fda4f2a2f5ba1fe0fe55de43877b012820", 0x27}, 0x48, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000200)='.dead\x00', &(0x7f0000000240)='0000111122223333') 12:40:57 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x501044, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) 12:40:57 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 12:40:57 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) 12:40:57 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x101000, 0x8) ioctl$SNAPSHOT_UNFREEZE(0xffffffffffffffff, 0x3302) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x302) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r2 = openat$incfs(r0, &(0x7f00000000c0)='.pending_reads\x00', 0x40000, 0x5a) r3 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r3) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000100)={@desc={0x1, 0x0, @desc2='\xe3U\xa7j\x11\xa1\xbe\x18'}, 0x10, r3, [], @d='abcdefghijklmnop'}) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) fanotify_mark(r1, 0x19, 0x2, r0, &(0x7f0000000080)='./file0\x00') r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 12:40:57 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r1, 0x40096100, &(0x7f0000000280)={{&(0x7f0000000200)={'KERNEL\x00', {&(0x7f0000000140)=@adf_dec={@format={'Dc', '2', 'NumConcurrentAsymRequests\x00'}, {0x9}, {&(0x7f0000000040)=@adf_hex={@format={'Dc', '5', 'RingSymRx\x00'}, {0x6}}}}}}}, 0x1}) 12:40:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(0xffffffffffffffff, 0x80605414, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000200)={{0x2, 0x1, 0x2, 0x3}, 0x100, 0x101, 0xd8fe}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000500)=""/148) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000480)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) 12:40:57 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "020206000000000000e1f051a504a54d753c354fe88269e69f8cf5172bc769b9cdc2ea015a1d006500e0ff000000000000000f00", 0x2e}, 0xffffffffffffff0c, r2) keyctl$clear(0x7, r3) keyctl$link(0x8, r3, r3) 12:40:57 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 12:40:57 executing program 5: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x18740, 0x21) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) write$cgroup_devices(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="be0e2a3a2886e2f9121489ef182de7bfa97118c638c2629a0885f68e368a15289a7240373120c9906fc6c77858b101077949e5222030dfe6a62b2e34121245f6199ff907ebffa841765677840d764acc80be7e7979f0485dd9b2da23ee7c00"], 0x8) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f00000002c0)=0x401) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000180)={r1, 0x7451, 0x20, 0x10000, 0x2, 0x2, 0x9, 0x0, 0x5, 0xe4, 0x7, 0x1f}) clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) clock_gettime(0x6, &(0x7f0000000140)) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000280)=0x4) renameat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) 12:40:57 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) linkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x3000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 12:40:57 executing program 4: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100), &(0x7f0000000140)) r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) openat$incfs(0xffffffffffffffff, &(0x7f00000003c0)='.log\x00', 0x0, 0x18) connect$packet(r0, &(0x7f0000000400)={0x11, 0x2, 0x0, 0x1, 0xcb, 0x6, @remote}, 0x14) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000240)='trusted\x00', &(0x7f0000000280)='\x00') keyctl$link(0x8, r1, r1) add_key$fscrypt_v1(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000340)={0x0, "06f83477ffaa0e41600cb45bb8bd0b963dd43494ea477b1dc0ce4e251785b745f0f3bb7e7331fcfb3219ffe51cd238977f1973a6ae65679778bfc382ea6ed27a", 0x1d}, 0x48, 0xfffffffffffffff8) 12:40:57 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) connect$packet(r0, &(0x7f0000000040)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @multicast}, 0x14) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) getsockname$packet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:57 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 12:40:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:57 executing program 5: bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, @none, 0x2}, 0xa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x220c00, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) 12:40:57 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000100)={0x0, "4763e17a26e64be427e1f051a560a14d753c354f7f384f1675caad3da3a9e8823153fc1258f3834a65df6f5f2e03000000cdc2ea015ab2984f71610256513965"}, 0x48, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, r0) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) keyctl$reject(0x13, r1, 0x5, 0x400, r1) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$negate(0xd, r3, 0xffffffffffffff32, r0) 12:40:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000002c0)={0xa, 0x4}, 0xc) fanotify_mark(0xffffffffffffffff, 0x61, 0x48000011, r1, &(0x7f0000000040)='./file0\x00') 12:40:57 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 12:40:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 12:40:57 executing program 5: ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000040)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x212100, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) 12:40:57 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 12:40:57 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$clear(0x7, r0) keyctl$link(0x8, 0x0, r0) 12:40:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:58 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4}, 0xc) 12:40:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 12:40:58 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40000, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) 12:40:58 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:58 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x55}, 0xc) 12:40:58 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000200)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000180)={0x0, "4a15cdeff31097b96d5f3414e2a10abd72074a2f25699b29c8c3cb7738d119fad0ddf098438d0589ca1d081ac16215c312436da84dacdc6df698dfa4e14f8fcf", 0x32}, 0x48, r1) keyctl$link(0x8, r2, r0) 12:40:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 12:40:58 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:58 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x40c000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x3, 0xef, 0x24, 0x40, 0x9, 0x7, 0x7f, 0x7, 0x5, 0x0, 0x5, 0x4, 0x8, 0x5}, 0xe) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_UNFREEZE(r1, 0x3302) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x7d1, 0x40, 0x5, 0x2}]}, 0x10) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000100)) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000040)={0x80000000}) 12:40:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:58 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r2) 12:40:58 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:58 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x500, 0x0) 12:40:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040)={0x1, 0x1, 0x7, 0x1, 0x8, 0x1, 0x1, 0x7f, 0x1f, 0xd, 0x9, 0x2e, 0x1, 0xfb}, 0xe) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000740)={&(0x7f00000010c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000225bd7000fcdbdf25030000000c000f00030000eaffffff00b4fd48e24cfdfcd578b22652d1a581e07fc2108352cec4796677ce8a085b8bcadbe8eafe03efedb82682dfdaadcb2b4bbe"], 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x11) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0xe80, 0x0) r2 = syz_mount_image$omfs(&(0x7f00000000c0)='omfs\x00', &(0x7f0000000180)='./file0\x00', 0x480, 0x6, &(0x7f0000000580)=[{&(0x7f00000001c0)="f2392bc9888f35dafb3493c5c0112c06945951a89ffc86af70cd192ad33bcfb000bd28c0cf19fee830c7c2ede149adf5e2e963c89f973b5fdbe5207ceecce61a93eeee9001f902c9343a937bb1510a3cecac0812e9416feb60824f8295ab36b0bf09231a", 0x64, 0x3}, {&(0x7f0000000240), 0x0, 0x7}, {&(0x7f0000000280)="f37d9775a5080ddbcbdf1568cac1e7f1b1c9d405282fb26df3528f53c7fd331a006b0b1f924cdd3d71ce00895df6ade0bda79b8c4cc7150ecbf6e7d3edf60103265b0f8f1720300f8b207aca027045ea8864b1bca4879a581612e12cd5467a43b7eee6f2836be9c32c0c33d15793dfee297c81f662467b0d50a8473ab4a5dab129edc990a664aaf6ed26de77cbe49fb2e5292493ac498b88f27ff8325a83c9c870b3569eaa2fa1c73d95b5c2007cca0f2c2f4153a372921504d80ae3014bec0ef7dfb09b6ec5b6da50b77b9e40e2b6bfdfb0bcfe0d59490254cef7b800cb441f35f2b224f603fecedc3a32cdc03944e6f1ff4a788eb7c3", 0xf7, 0x44}, {&(0x7f0000000380)="3a7f7285f89e250d3bfceb72d0726f80277159b5f885e1076910162399e865f4698f4afd44de553a711f52436e0fd3b731dd86559beacb9c1a730f874d0d0c64112e9a2deb078defcf358d263d54433e581a55bff565a9f6acc3dec1e723da37360652d9c50e42cb168803a4210a5f64a495d0f20fb05610b844ca05aee7bf0170d60ef1d860d67d2b99459a035a50ecf150f2b9809f94532c707ca3738c53a85bcad935fa6e703adce0", 0xaa, 0xd7}, {&(0x7f0000000440)="2261844cb5254130cb0a0b1e7ebdfbece69bcb1c17b61f143a32381ed17fa12680c33d4e97f53303c3b41ef3ca333273428977a40b82f611c81cf20470e9be82e8fef13892949d4c5fd45492958f90fbd128fe84dcd20cc3949254f7636b0a99706e2866e7fa1d459867b35bd349c6089415d46b018358ddfd3e2cd653846a894cc67918e9b623705d805abcdbc91b1ff641fc6d1a1faf1f45370c172f7e4619a1e1c0038e21a19a701bc54b36bcef90fbc7034075d6c22ba883ce148b010a0c7a09787c351da5dccba2542560cfafb4633fededc8deb8ce28fc5cc77da90c625ab9ee6ea173136c3390055d764700df09dab1ae2074a63b", 0xf8, 0x7}, {&(0x7f0000000540)="867ebd94c6864cbd0ce7c5a183", 0xd, 0x4}], 0x800, &(0x7f0000000640)={[{'/dev/nvram\x00'}, {'/'}, {'&--{'}, {'/dev/nvram\x00'}, {'/dev/infiniband/rdma_cm\x00'}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}]}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r4 = add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) write$cgroup_devices(r3, &(0x7f00000008c0)=ANY=[@ANYBLOB="005555829b9997ef08f9de1737cadf8485bef12f"], 0xa) keyctl$get_persistent(0x16, 0xee01, r4) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r5, 0x330f, 0x1) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000700), &(0x7f0000001140)=0x4) syz_mount_image$omfs(&(0x7f0000000880)='omfs\x00', &(0x7f0000000900)='./file0\x00', 0x81, 0x5, &(0x7f0000000bc0)=[{&(0x7f0000000940)="47dcfd3417d2628d29f6d2df4c8f138c42167528f6362d2afe7e26f1be2463e8e71fa123762a78c1bb9753a22d58a22b64193e014f95603d5c8d3e18561f98907ae294fec6981932aa7a081442b3a83f73837f7823e89411666e5301f5632ee6452cea070bf94bf161c88e49cfb3eadf9fe82eec", 0x74, 0x7}, {&(0x7f00000009c0)="f1dc55e0b546b2164baa17", 0xb, 0x7ec9}, {&(0x7f0000000a00)="943dc140344f78f68aee6b36f6798e6fc22bddf3b8d68122e828f8a8ec64de0f47d8b1cec532965a7c08511dc1fca73738dc9c4c2a60", 0x36, 0xf51}, {&(0x7f0000000a40)="bc6a2076d84ab53192ecfab277e3f757376c957fc4d363f99ca4958c4f943fbe60219178b0e82948d4985f62b62726c3dec02e75a4fa99d86bb643b4cfdcc0a1eaab8bf5a6ceb169a093cb30f87d41fbbe32d6e6a89b8309b6d63c5b181d800aa1d159a2e18b4a8b64606ac32b56f20ff483da6b94191d3546317888fa8d8137e8", 0x81, 0x9}, {&(0x7f0000000b00)="605b4b4113819b743e4c9e069571eceef7df9bc57a8c88b68403d1c4b82b2d671330076d9729c002fa308f2710ca0fa30131af6cfa943f447f62c0060602da6f5de25528c6f310fc1f38d5900aa598e2064fbbd5dc8eca64e21f77234074fc2bda445c6fd0399c1c2e0cbdccdc2b089539ee7aa78d9406a8dd5a732324da588a948b835afb14f4bb3aac45", 0x8b, 0x3}], 0x80020, &(0x7f0000000c40)={[{'.'}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}, {@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute'}}, {@audit='audit'}]}) r6 = syz_mount_image$omfs(&(0x7f0000000cc0)='omfs\x00', &(0x7f0000000d00)='./file0\x00', 0x3a54, 0x4, &(0x7f0000000ec0)=[{&(0x7f0000000d40)="8a2127c5a60334cac5efa2799b4080b6b1af6b5f986a4fd2", 0x18, 0x4}, {&(0x7f0000000d80)="f361f1139c003bb7bb5c440dd89801dca4594d6fd45d351cf0aeafe253795d40a8da559fc4b1ea6742d434c0706a14e99ebf286374a858a779fb3c79e7c4bbb55d5f10c38dd940fc8025874d269de21a88ce058b0e21d87e29581f39ad5477712409d00567947c97", 0x68, 0x8}, {&(0x7f0000000e00)="07441f03c2d4f64fea2b716f31d5c4ba24131059b0d8844a1ae3e2edb8d169a02bcbd08842dbb8be29048b530635d7f597600f2eb0", 0x35, 0x7}, {&(0x7f0000000e40)="b4d70a211fb4fe77c4fe2af80cce9038f80068c6aad14655889577ade6af4aaec8270939b26592836d6f06423ca3a66be63511584d5dcd4a55247135fb89d021ff2de238fdd7906d197ffc1399b48f99539b1540d60c0545ee29c0bafcc783", 0x5f, 0x4}], 0x800, &(0x7f0000000f40)=ANY=[@ANYBLOB="2b2c5d2bbe283a2a242c61756469742c657569643e", @ANYRESDEC=0x0, @ANYBLOB="2c6f626a5f747970653d255d2c6602776e65723d", @ANYRESDEC=0xee00, @ANYBLOB=',fsmagic=0x00000000000001ff,obj_role=#},\x00']) statx(r6, &(0x7f0000000240)='./file0\x00', 0x100, 0x10, &(0x7f0000000fc0)) getdents(r2, &(0x7f0000000140)=""/48, 0x30) 12:40:58 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) bpf$LINK_DETACH(0x22, &(0x7f0000000040)=r1, 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0xfffffffffffffdbd}, 0xc) 12:40:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:40:58 executing program 4: keyctl$link(0x8, 0x0, 0x0) 12:40:59 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x6) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) write$snapshot(r0, &(0x7f0000000040)="0ceb2132d47244dc64f785ef804b2e105fe7771527a4ffa6c141e629dc15472c4f93dd80bf4cbda2f06476e75511bd3ee7d957d120c59819c1c209f4bd1c913f1861f1c5f7d691c22603f71c3f46557b394c0ffd56f33e60431a6a7797960de11e9c0043750a4d91b72e7d6e9966c255e4654a9d629b4c2a3d06706e4f25a3efc3df08900116b62e63479c60a2a127f672c4e64ad7be80175966355d2533a6c2c416b17c", 0xa4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x1c000, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r1, 0x40043311, &(0x7f00000001c0)) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0xffffffffffff773e) 12:40:59 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:59 executing program 4: r0 = geteuid() ioprio_get$uid(0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) 12:40:59 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) sendto$isdn(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="08000000080000002bcb9f83990df9e99b8f52e891fd556489478cdfeaa240234582ec45716f9e21c5d58e47076abd592e2bd68038240b41917fdc6a27c16085dcc167b65a1bd20f417d114664a51469eddf379666b743809811ee8d0b3ad58eba27e92bbba227c22b10d7e2e90dda674b31a2235e7af10bda51d93a2ba95dc62a9b12d452c38c59f5ecf8ec2c5603ce12a9315fb645ca2f72338ad78164d48d9a5d7da5dc0585ca056fe6dd35b22ee34abd28a45fc69279fd7615436569b0b9bcd94e578017156d8a000000000000000000000000001f00000000000000f6bf5fb060f261ff4bc949d5605eb648"], 0xd1, 0x20000, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000100)={0xa, 0x4}, 0xc) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r0, r2, 0x3}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r3}, 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r4, 0x80083313, &(0x7f00000001c0)) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000040)=0x100, 0x4) 12:40:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:40:59 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0x0) 12:40:59 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x6) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) [ 664.677418] print_req_error: I/O error, dev loop0, sector 0 12:40:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(0xffffffffffffffff, 0x80605414, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:59 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) keyctl$link(0x8, 0x0, r0) ioctl$IOCTL_GET_NUM_DEVICES(0xffffffffffffffff, 0x40046104, &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) 12:40:59 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0x0) 12:40:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:40:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) 12:40:59 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) [ 664.786380] print_req_error: I/O error, dev loop0, sector 0 12:40:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111, 0x3}}, 0x20) 12:40:59 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0x0) 12:40:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$clear(0x7, r0) keyctl$link(0x8, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x3}, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000140)='logon\x00', 0xffffffffffffffff, &(0x7f00000001c0)={0x0, "a995818cd26f5b00899fe1ff9bea2e4b3e0ac1a64c84f9ad85e8beedbafe47a300803043eccd55b615c3a508b46c2065dc9bdc5d18013044ecce48a99e1c9cb3", 0x3a}, 0x48, 0xfffffffffffffff8) keyctl$unlink(0x9, r0, r1) 12:40:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:59 executing program 5: getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) keyctl$unlink(0x9, r0, r1) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x202a42, 0x0) 12:40:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x3}}, 0x20) 12:40:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) 12:40:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) keyctl$reject(0x13, 0x0, 0x9, 0x863, r2) keyctl$unlink(0x9, r0, r1) keyctl$reject(0x13, r1, 0x7, 0x8, r0) 12:40:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$negate(0xd, r1, 0x0, r0) 12:40:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x3}}, 0x20) 12:40:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) clock_gettime(0x6, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) clock_gettime(0x3, &(0x7f0000000080)) 12:40:59 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r0) keyctl$reject(0x13, r0, 0x666, 0x3, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvram\x00', 0x109141, 0x0) getsockopt$inet_dccp_buf(r2, 0x21, 0xc, &(0x7f0000000200)=""/221, &(0x7f0000000300)=0xdd) keyctl$search(0xa, r1, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x3}, r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) 12:40:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r1}, 0x8) 12:40:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) 12:40:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x30, 0x39, 0x61, 0x61, 0x35, 0x65, 0x36, 0x31, 0x34, 0x63, 0x34, 0x9, 0x57, 0x38, 0x62, 0x33]}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_persistent(0x16, 0xee00, r2) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)='0000111122223333') keyctl$get_persistent(0x16, 0xee01, r1) 12:40:59 executing program 1: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x25}, 0x10) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x80000001, 0x10800) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000080)) 12:40:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x34, 0x63, 0x65, 0xd, 0x35, 0x66, 0x38, 0x39, 0x39, 0x63, 0x38, 0x4d, 0x32, 0x30, 0x33, 0x63]}, &(0x7f00000002c0)={0x0, "0763e17a26e64be408e1f051a560354f7f384f2a25caad3da3a80000000069b9cdc2ea015ab2980400610273513865000000000000003a00", 0x2d}, 0x48, 0xfffffffffffffffd) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000200)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x50b500, 0x0) recvfrom$packet(r2, &(0x7f0000000340)=""/213, 0xd5, 0x40010022, &(0x7f0000000240)={0x11, 0x15, 0x0, 0x1, 0x7, 0x6, @random="29cbecc0aaca"}, 0x14) keyctl$link(0x8, 0x0, r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000100)=""/176, &(0x7f00000001c0)=0xb0) 12:40:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) sendto$isdn(r2, &(0x7f0000000080)={0x1000, 0x8, "a2b4c32ec08f560be5c334f0ef81fe1c68768dd7a0441f76e49856be74254eb95c1fe887ecee298a5696c1c00f6e5eaebe09f72555b5c655bb56cfd60a010504392e881762538cdbf045e9e202c5c19633033b862ba9"}, 0x5e, 0x40000, &(0x7f0000000140)={0x22, 0x7, 0xc7, 0x20}, 0x6) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x7799973342bc3a7c) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:59 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) ioctl$IOCTL_GET_NUM_DEVICES(r0, 0x40046104, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000080)=0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) faccessat(r1, &(0x7f0000000140)='./file0\x00', 0x30) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000100)=@req3={0x1, 0x40, 0x3f, 0x6, 0x6, 0x5, 0xbc80}, 0x1c) 12:40:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x3}}, 0x20) 12:40:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) 12:40:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8820000f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f7161025f38f90f", 0x2a}, 0x76, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:40:59 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x1) 12:40:59 executing program 1: ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000040)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x3}}, 0x20) 12:40:59 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x34, 0x63, 0x65, 0xd, 0x35, 0x66, 0x38, 0x39, 0x39, 0x63, 0x38, 0x4d, 0x32, 0x30, 0x33, 0x63]}, &(0x7f00000002c0)={0x0, "0763e17a26e64be408e1f051a560354f7f384f2a25caad3da3a80000000069b9cdc2ea015ab2980400610273513865000000000000003a00", 0x2d}, 0x48, 0xfffffffffffffffd) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000200)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x50b500, 0x0) recvfrom$packet(r2, &(0x7f0000000340)=""/213, 0xd5, 0x40010022, &(0x7f0000000240)={0x11, 0x15, 0x0, 0x1, 0x7, 0x6, @random="29cbecc0aaca"}, 0x14) keyctl$link(0x8, 0x0, r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000100)=""/176, &(0x7f00000001c0)=0xb0) 12:40:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:40:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x3}}, 0x20) 12:40:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) keyctl$link(0x8, r0, r1) 12:40:59 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r0) keyctl$reject(0x13, r0, 0x666, 0x3, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvram\x00', 0x109141, 0x0) getsockopt$inet_dccp_buf(r2, 0x21, 0xc, &(0x7f0000000200)=""/221, &(0x7f0000000300)=0xdd) keyctl$search(0xa, r1, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x3}, r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) 12:40:59 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2c002, 0x0) 12:40:59 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup_devices(r1, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/220, &(0x7f0000000240)=0xdc) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) getdents(r2, &(0x7f0000000280)=""/152, 0x98) 12:40:59 executing program 1: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x0, 0x2) sendto$isdn(r0, &(0x7f0000000140)={0x3, 0xffffffb7, "0c0a14055619596af76e6734a635bdccd1bc44b5c8599a30292f96b49000ec2ba9e95445e4814d39a7fa86a49b06720d84be66fe0510f3a2201a89cffeb42abaa8a9466b0c1fb896ec1e1a8c07483c19f19642739aa13a491b7f26ec12abc13c8de5acfda25e594b61db1280bd4b461841b087fe58871d5906005aca827be7e64ccf8f38ae605a2d7a55b684aa94162c900adcecca6ceb8f"}, 0xa0, 0x4800, &(0x7f0000000080)={0x22, 0x81, 0x2, 0x1, 0x4}, 0x6) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x3}}, 0x20) 12:41:00 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000140)='cifs.spnego\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="a10000000300000066e13fc1630413c71add22321a78ad029763f4eaffacfae90421288c1d5116935f3927b20936d72dd3cf91b71e62eea5551400e13409e40c01b7e27201eb6229f86972bd530fac14a7adafb9c5f907d4600cf7471218f3d26c29cf6b52a5d089a93e259c6869ea2cfd1f4c08c7b1c4f6ff4c8aa2cad390da979f7e63319c183c9ace715b9ffde7f82482dd1b7a43adbc3883502e40c3261dbf"], &(0x7f0000000340), 0x1000) keyctl$reject(0x13, r0, 0x8000, 0x4, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000180)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x36, 0x61, 0x38, 0x34, 0x63, 0x37, 0x62, 0x30, 0x37, 0x63, 0x35, 0x37, 0x32, 0x61, 0x65]}, &(0x7f00000001c0)={0x0, "8c60a14d753c354f7f284f0b5fcaad3da3a9e8823153f012c431f20520589de62e67155ab2984f71610273513865faffffffffffffff00", 0x23d}, 0x48, r0) keyctl$link(0x8, 0x0, r2) syz_mount_image$omfs(&(0x7f0000000380)='omfs\x00', &(0x7f00000003c0)='./file0\x00', 0x344f, 0x4, &(0x7f0000001580)=[{&(0x7f0000000400)="57ec99450bfdc6575cf8424b6b6654e71506d69bf5408fbee71559254233885e3a54dcac", 0x24, 0xb5b6}, {&(0x7f0000000440)="961f6fa6be1d33c8724e45c9334699398d58bb15f645db45c02976bbf1606984d779ef55ebbda2", 0x27, 0x2}, {&(0x7f0000000480)="24eafe0173fec32833c36109eeef905f721677a56fdb21c43db8b2b56752516d4436246aedcc649a30aa669a68c12b8d0e1779c199eb9df4956309a118f5c83f7ebf8025f3765c70c497440e9e9f9ce5a246d697b322dd0b177773de53bddb76bebf430a93c58fa5cdfc225f4623b38bf0111f6fd1", 0x75, 0x3e}, {&(0x7f0000000500)="42c56cb1febf28fa2ef261a6ad37b84a031ee7ef45f5271630d34daaa03d3dd2c92dec2ada78f6ccd1402dffbdfcb1e597d6a8cf05ac16186ac035020581602e03bd846e8468a5bb068decd9f80f2c77c5fcd2891c0d80e2338063e41d495895f6639d771e48c8f5b53d6c5e207aadd6d24d50fbf34cdd1ec6609f7482bffc5aae8376c9b9a67b5138d16ce6e8c94e83f1d5bd103e4018b83588f2a9faefe21b90818973e7d2f2d285835ad71496c3b7daa4d22f4f7ba88b72957ce38ef52c6cdf2ef74e382933e06b2cb52ecaebe0da58cd5345d95e472691d51ec72fa703899f48df8b4bf8c03f3f2f22aad7ac0506c6124dec92139b4ae3f1937351375f2757bd70fd12d651430b2184f23f3a9a7c9851728158ab6fe1bf28f93507ba2e005d1c12ba5b6fc49369d5a3d754df62da3b33181828f9c4ff94830524fe0a8753cf6b678367a52a794906dd729cd4f2bcce01a57c930745c136493aa9127c5f5ab78923ef4958eeb7201219e6ce8a1f775622bd2958ffe7b8d452bb359bd4c671e6a2307453e0e6232ac427f6d17b0148c615d75edfc07d164678602acdfd2274c6245e1b4b921dc5e9630a74f58630f10b89a920925678b1efb84bcc26595ff6fe74dd60870b909fd04dda3c0c04b11dcd48b2cec7287e1e9e0dd85d48866fad4f7db751474c5c0b4ec4987fd01d9794e9115f5731bad3e1037ce7d5603fff57730b4872567fe000e5139bfa0db9f88bb466d4eabeacc1ee38a0848e94582f62bb1610f2a64c22cc5284c03d44a65acbe5ff62e9520e91a19e804d17b5a79c3d50f9f25c23bbbe53a4617f2883452e3adfc07c86f238af609b134ead9a5b1835813ab2a33cbb0174b397f0e8e0cbc763799f7868e4706f1f8b6dbdb9230b5de8a5424d97a14ecbb9f8025179324cb95e488f71362069f850e460c62c7831a904054a835cc6857c83a33351593afa74e87198ae7b29cb7450464d4727be4e1b2654a801c7685b4c2eee5c166c47d32f32434e6fd1ad652a57ff6fc25dfb085f5fa144126c744379b7ef0af4c026970a60830d8ef6925f049194416e936fb339271672854629248c58655e53fb6b23f7dafc463a98edfe0a529561f629ef3a26d8b9abb50d14f18d2d1bedcf4e79753288300f5ce950ee72b3a1714cf0e5472ff914c58baee1124ed0d1c12b24c4bbad624f9ee6856fbe06a24537d5d15fe36c86f74fbd8f5d437cbb8120068de734d7b186f3bb0b4eab9dc19daccdf8a20fcc247f8b59d3d8a904d8f42f45119886e5991cbe5b7591664e5f3cfe275083b9a089cab012d8db4be34257c1d262006bee7706abc716640c46b2cddedc64d599542c729488f7d4178295635f3315b2ddc6724912d259c64f132081aa92b2400d4516d474c3c2b19388541b276694d8fd50257479a2f22cf15ac02f5035c1bd490cd084e229d989af25eef49fb664199fa544b1bf92179da1d57c10b02b7955cb1af64ed9a6c2a47d9edaa06f9e032ea158f3216c7a7d36920f2b3bf34a18d4e8238205e860a436adf9c1783af01d0d7ddc190b731cbc69b5f4524db8968b63c313216d98113c044fbfecb5e132e38a576e21eccc3a7b3b1f32b45c06ae9ae5179793c897e661577177f0465dea119efcdab224e275ace2694ba2594146fab935c436930e1a7e3150baf2c1bc26aa95b2f48049473704118bab7f55a66f6dbd19a06fb1b84e03d26680fa4abdc6bd309cfdcecbeafd6d6843370e02201857210fc66bb496a974a892080c23d223c4fffa6c8ea646aae32baae46cb5e154dec681025670f7d56877a875fef481aa6fbc32327d68335d52a4feff6b3b3cc674b335c6f9ecb386fb72e9d0c4d8271c724d85fe5e44beab5327ced59d4a63cd9a0c8e00f93734d8efc1b04aff352fb371afdf49a68f93def2043b3e8e02e6cd60d046a5f28b90ba46e1f50e59b0a1b402af5b9e0f67a831fe3b0fa2544dac0a221db12f28cda2da4e6dc94d4da22b54280f189fc7a225813750c9241961924dd059cef6ee77af9156be303a1c6484660ab6679714d57993893d37f2ff2a968d858e0238eccf06d694478e462d9f5c3357a195cb27636dc39daf70271da618b669ccfcc17d5a25bed6166c1c2b3d4832b1de06a9e229100c3bdaf6f1450a4b23a77ea084363eb81f862e0fec3c2e88445449b4f80801370e3974be5b42dcd0e67f09105fa412f12a316a279363ca6f52795279a70f0cbf0d4c4a860a516e6bda5d80929bd3d208815ce7b023f0c5b0f7a5975cb37472da2605e01b7079506bf171babbafce89b86d68a12929322db94be7ff768b56b11ea758e8b6721f09dc1a09cec951ece90d6ad67cd9ea42c4ecaf39c375a55094471f11e17df48840ec432911329aa5af03c9b7e4498a9c5352af5b4d35e70162946cfa0cb38387d4fa10cacec98805ace6b598d9fc23a8e05c7a18dcfd2425b90a8212b47a43a2334ef6196e392993be4acf1b0e27606e7b912a5466a6aee55fcfd2a13f610f756d8342ebe6a23d3cf1438e3d8b95e9b30230f5b9597320cd7d75bd3111da8e42e29ef5026ee923aac0503be0a0f5b8a600a38e161c06de2b8e105e9375a1359683e3c7738918e55ca6b533b6de53922e249230da58ed2041197debad06cc1cd8d2198ebd2699b3246c48429dad561964fbfadaada4ec391801e60b1266a194656ef42dfe1cc56f770a38191a42b87b4b47264f688ecc2796ab946191a5517734a69186bbc7c36fdd846d36e0c12b7d2ab8f45df3085ad929388ef5cdf222d88d8221b280a2f32773911cdb4def1a0c332889fdbf256cd8f0addee4f1a77b517155eb7e97ca0c25f1c79458efdb01c7e5ce887706310e01cbb93f811fe43240c200c96183235c952695f02591d17a7e73fad38df9527eb612b585cdcc757e95134a90b684bc925ff0d4540a05bf58082d9e16f597983a10871884edea51c7135fbeb70d5a12de8338504de675ff91cd72deb694a57a32fa0e6cb2f10eadd0999d794739ae7adc235ffa38031abcf3084b61166ed7721fa2b55b7a82b65c0999f635e17ae4be03904b092c187539fa055fd4c16d7f77c3d57c36178464a14d0aeab62183cffb2a9ffa9e2cf14841c8423ce59d361e187b38e1b7aa7217fc32a4cd95a96618aeb82863e2a6f697f61c550546cd08b2f62d4ad9913975c304623916104392cb887659c1fd17b461cb91be155d0524410d6f5cb938e7a5396dcf8a08d212b28839ccb3b1ce82f766696fce9315b024afb90b5df7ba01ea31445501536e0b9d5cc2db8363f86b1da7c99827766fc4a89381e0b719fa5766be7f02fb3c7c953064d0c1cdcfd1e79ffc12b2368ef0e80b7301c0c3e30722ee25d60f073af621a17b48b76feb52fbf07ca396849bce6f0193219baaa1d4b76915f54a35ebe95619dcc195ca6305975b22ac14af9a99c4f797ea9c2e1f5c67bf8d166f9089429c34f6985c1f7b316acd63b7337b2e7ce6fbdbbc1c6cb87789daf8145ea11456735b5db7cc9fa52af948206e1597a0c86f570b05e8d02a4aedb85d398b81c4f974cc247866a55411ab53b77c80ad803c5fac2198b00c04565ea959b242c664a6e4c1ec057c4ce1276fc86664eaf942fc3005bbe313f5ec3fc44fe98941fc51b5c730c6a2e17eef14964fda4c50882adc6bcac2c89bcb3142dd5dc5231a0a7c61ed5c729fa6d17fad524741c046e8c9c4f39b6172d18c860f5307842f52743757526c2fcf96e659d42db3c0a05482010e841af4f9fec9247120c766fb38a9cf2b84f4bd25818b7ff5dfbc296efd78d401deedb116d21de2e7f382ace9bf736d51a61f0a756ed57f6d42dcbf1ee4e26f3fd642ae29926b8c2e23787a3451d1f576b69576b8e07b67f17ba496eb1daa022ac44bcd7d5a82fb20acb0a429070bcd814353150e9634d9566262f2573eea568566f443e84de2db6b960ff405876a63a1c02fa74c37aaab3147a7eb22f47fab02dd02da673e5e048c9986c49809b78eeb6348b4730c76d892365b4605df46421fbd7a27f3edba0f288959543c8567996e6f375339215cc949f63e2857e2306782862f69e2fc600a66528cb4114a4ebadb777cd52e25835b0906ba70f3fee689e77c02253a2d8ea15bbf5ff815a1a7f10cace0ddd07d62c2908ec891ff22ae1993d417759ddd9a86d65c9e3c2c693af4693143bd72e4a2eeca87f0945f204d63565d1a20ca3952dda25c68b3ce251ed990e1528a65987ebe871fa01c10b8ec9f657749b6116282501f5b9199e02108935844a10d6347bd87927cce5db8d8a1a59179db3eb23db6904116f07962e8c72df2ba5d8ca008c8144639fac72880b5e74a9d9becc3b8f021340b3fbb4ac409d51f5e3abaa607e388fed4b9f4d92fa980fe426e4e9c4436c0c54b9395d287a440b7ece2f28e9841ccbb7c41d6d4ea05a3f91a91cf044626b228f350f16b1d46d74b437334e62fdd87792eb8f09e0a8c4bebe13260e82312c31f59f043b2f04f9b511843a406b81ca237aa9aab489ecc845dd76ea9789bafa49fed54ebac099f1006ef47b61c6e5c47d81e9d5e821433fee70593b58ffe6bb142d10b1fe6d357a5b6c28ceab7b192270b561d080851272d5dabd64c892fbdf0de4f859b54ba87182459356f379ce1772fdb84ff9759f5097246f5b8df802aa57b1429b81c2c46f34cb08350ad88bd23d31ed50f5d455707033568871f0c94f637beb32e18fa762c9ddf1354cc3e1fe29dd9a12ad9f4c7339a6a2bb81428020335af79e3fce5fc2bc452587de4d11e8d23283dead4bddd29a7ab2fca3f7074ad62ca71465d3e4da76328c1dd07aef157facfdf73e6ebc949b44e1dda724533692100f351fa569978ae3395a66c5efca4f97b9ff623f9326f58cb3f3691c1c8452c91ffd730af383af3942ba8cad465f89bde16abcddc712197355929b27d79c39964d2afa8d1cf0f7664dac1db135a74b8fc42ff1dcd5d3e22b8e8c6184553ede66a4e33aab04234d93e88a6c9ebf14e7ea6e084be03d31bec3bcfd24cd222b8d4ce17b068d14d5e3bb504679c826ff42c6ca888d86a909c5066d04e8a006560803bd2a3357c1ee8e856bfce209eca1c15d7dbc4e70599dba4e79525b64f8f3f3d2e72824be18820773b788fffd1b09480030c32bb9e8a8ea49f910aba9b615fa313a29fd39cead0e30537d0d30785bbe65c9299c713259845ff158496f8d02563398b2937efc1e8a7ef08c4e255cd323edbf5cc81a3d698ba1d8232eaa31fc1f08d11717ec739e95b3abececfd38d83c16d68d3c13653315585642feef1878debeccf82c914b3bd650a6a3f599005f2f2525570b9351cbaf0a9c4c2e5edd67acda940f4ef6d68af57655def7e35e78b98811697d17735a00c48e700427890913cd3928c8e5e14da0b33f2ec41a919fbd6712c9ac59cd03563cf6b94660833b2c6388b8f5b2f10465edc5188001c2770b69d44daf55ca97b93bea248fede8ea96b9b732f7f6f1dbd35d957cdc297c7be1ac12d0adb40ebfa666df358102a762ca9a9bb295e0191d63e28ef3f9278bf347e782200e42aa3ee054c8c57dd68febd7a9a8baa933e3fc3775953e2c3b6db6dff0563641efe235b53d3a71cede45903e1b8bef1b27ecf9bea139a6703083042ea2d77e52e5bf0e0958b05fd3e4480ef4e32b4c6120fdeb75a16626cdedf49815cca5fb66d925e680b83e5dc848dfa26f3e5a34fc753adcbee854f3021e192cff56da063ee22ddc17b979cefb0477a141c9758474709b2283537f0b2d5a7712b", 0x1000, 0x80000001}], 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="28dc0000000000e02e", @ANYRESDEC=0xee00, @ANYBLOB=',dont_appraise,dont_appraise,\x00']) r3 = add_key$keyring(&(0x7f0000001500)='keyring\x00', &(0x7f0000001540)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$clear(0x7, r3) 12:41:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x27e, 0x4}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 12:41:00 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) keyctl$link(0x8, r0, r1) 12:41:00 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) read$snapshot(r0, &(0x7f0000000040)=""/64, 0x40) r1 = syz_mount_image$omfs(&(0x7f0000000080)='omfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe36, 0x9, &(0x7f0000002540)=[{&(0x7f0000000100)="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", 0x1000, 0x8}, {&(0x7f0000001100)="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", 0xfb, 0x8}, {&(0x7f0000001200)="2ec96071d0d06eacc79a13186615a5dc1c49f5c472f7bf0a6ac0c49d37cc93c83bdb7233c73f47a29b18a6950335ce9d5c5fc63948b89e91", 0x38, 0x1f}, {&(0x7f0000001240)="c16cc1d1ea2b8a1139ff8f6d946e7e040b7864fb87b6d3b5663254e1e1bb3d2d7d00b96db6873b4ce4975898d25aaf58b9c115d182f2ebbdf253c5f522e7dabd59b22d954b592bc1bbfa0fed41a97e2f56a3846eb106ac03fc60336de761e69c7fb451cc1719eae200300be3f17ca7c2c582955a3ffc", 0x76, 0x5fe}, {&(0x7f00000012c0)="03cac1212193acb6591b7d78714f885f8448e2508228b552eef37484ff28edccd17c758fc5656924152a440be769390bce7e3341fb3d0d65867fd750d490858ebd8173a10fa5745542d09fa6102620fc76a8f6bc3cffe2637df32e81e12759d5421bebdf9ebe085ab117525ba40fde7422dc4135cc57dfecb1aefe2bf1b7a2f5d0c2cdf2f9945e3997cb006000e5058cde2b6e6d4f449253d4e0058b4a2b3c6e7ab0e636c6fb4a747e6516690edcc5a3c1bbe64ad9", 0xb5, 0x9}, {&(0x7f0000001380)="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", 0x1000, 0x5}, {&(0x7f00000026c0)="90e2e97a2a60275126393d03d45125e942bc306defddd1b98e920f6fbfc5804fea3b6f6adc86b2999488fe1d028e39d4aa91957c0a07b513e1669db33dbf8da9094f272afda8e0ff6d2807baa4b3365d59eb30ebd3358bd04d75585d0e99138cb0c278a76d5717d7c42d66c122200b0784de", 0x72, 0x1}, {&(0x7f0000002400)="f37829d71346347cbf110937c67201ac61f752980fc4c88fbb1b23003564f63eb3b8d20d68645135a774b77f5aa64e086d974030d0f688f3f7c49b310e142b579e32faa5ad59608c7351211fe050a6c25c5d84ce891e17863a79f8e5baca943cb17150c5767be00fa27fab642390432715c1e69f164b1c301fc77568f8056e685cc5ba2c70c623d3f812f31796a85087d872ea0b841ddcf07472cae7c375fae23b27892e715462751bbcd39c65908cdf89f7d2969fbdd8d786f636c1e79bc491685e30748c7ad52c0839ba73e0e680be0a3253a966461dc0e4324a6d", 0xdc, 0x7ff}, {&(0x7f0000002500), 0x0, 0x8000}], 0x10, &(0x7f0000002380)={[{'}'}, {')*$:'}, {'&'}], [{@context={'context', 0x3d, 'staff_u'}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000002680)) 12:41:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) 12:41:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x34400, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) accept$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r4 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000300)) r5 = syz_mount_image$omfs(&(0x7f0000000340)='omfs\x00', &(0x7f0000000380)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000440)=[{&(0x7f00000003c0), 0x0, 0x4}, {&(0x7f0000000400)="3645dd125ee2cf6cf58023856ba0bc69b47f19db027e89eb9e045a5d53111438ac1a72e0ba7ba38aa37f", 0x2a}], 0x20218c4, &(0x7f0000000540)=ANY=[@ANYBLOB="2437502c736d61636bff73666cf7f88e6e5e9ed014893f486a246f3d2c6f636a5f726fc2e56c653d7d7b3a5b9f3a5c2a2f27292b255bbc706469726563"]) faccessat(r5, &(0x7f00000004c0)='./file0\x00', 0x9a) bpf$LINK_DETACH(0x22, &(0x7f0000000140), 0x4) 12:41:00 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) keyctl$link(0x8, r0, r1) 12:41:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1c, 0x0, 0x1, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xf7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40084}, 0x2400c001) 12:41:00 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) keyctl$reject(0x13, r0, 0xfffffffffffffffb, 0x1, r0) 12:41:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) 12:41:00 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) 12:41:00 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) keyctl$link(0x8, r0, r1) 12:41:00 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.pending_reads\x00', 0xa42, 0x104) r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:41:00 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x420200, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)="671689f1a41eac47adf50cf4056d598014cdf95d496be5f4ab2d6b54c96657b47d2256425adf095dd4fb7052467f707242b9716cb6269b4d37c546c3c5ef8d3d49bed6e5d6a3b1f7", 0x48) 12:41:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) 12:41:00 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:00 executing program 0: openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.pending_reads\x00', 0x698403, 0xa0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r0, 0x8008330e, &(0x7f0000000080)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r1, 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:00 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r3) 12:41:00 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:00 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @auto=[0x5f, 0x37, 0x36, 0x34, 0x63, 0x30, 0x66, 0x63, 0x38, 0x61, 0x36, 0x39, 0x34, 0x34, 0x39, 0x36]}, &(0x7f0000000180)={0x0, "5823d85755dbd557ca8b6318c6cbd96bf0ac85495d632ed3f095580d709ade5e79264e8260a90e61f780de4b2b4d1bad294ac4bda5678903bc9c74515ecc9006", 0x1d}, 0x48, r1) keyctl$get_persistent(0x16, 0xffffffffffffffff, r1) keyctl$link(0x8, 0x0, r0) 12:41:00 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r3) 12:41:00 executing program 5: keyctl$clear(0x7, 0xfffffffffffffffa) keyctl$clear(0x7, 0xfffffffffffffffa) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x80000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2a6040, 0x0) 12:41:00 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) keyctl$link(0x8, r0, 0x0) 12:41:00 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 12:41:00 executing program 1: ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000080)={0xa, 0xfffffcc6}, 0xc) 12:41:00 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r3) 12:41:00 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) keyctl$link(0x8, r0, 0x0) 12:41:00 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x73c0, 0x400}) 12:41:00 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x66, 0x62, 0x66, 0x62, 0x36, 0x37, 0x31, 0x38, 0x62, 0x32, 0x61, 0x30, 0x35, 0x32, 0x30, 0x62]}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x100026}, 0x48, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000200)={0x0, "0fc561091b548279d36c9a1417adcce30ae5a5a29ef5821fab3ae1972ed698220d67f58081492956413c238e76a3c6b133532a6f6ab786a841af4e686814d9e8", 0x18}, 0x48, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x1) keyctl$link(0x8, 0x0, r1) 12:41:00 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @auto=[0x5f, 0x37, 0x36, 0x34, 0x63, 0x30, 0x66, 0x63, 0x38, 0x61, 0x36, 0x39, 0x34, 0x34, 0x39, 0x36]}, &(0x7f0000000180)={0x0, "5823d85755dbd557ca8b6318c6cbd96bf0ac85495d632ed3f095580d709ade5e79264e8260a90e61f780de4b2b4d1bad294ac4bda5678903bc9c74515ecc9006", 0x1d}, 0x48, r1) keyctl$get_persistent(0x16, 0xffffffffffffffff, r1) keyctl$link(0x8, 0x0, r0) 12:41:00 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x210200, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r2, 0x8008330e, &(0x7f0000000200)) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r3, 0x0, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r4, 0x8008330e, &(0x7f0000000000)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r5, 0x0, 0x0) read$snapshot(r5, &(0x7f0000000300)=""/262, 0x4b391caf) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x6, 0x4}) socket$inet_udplite(0x2, 0x2, 0x88) 12:41:00 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$negate(0xd, r1, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r4) keyctl$link(0x8, r3, r4) keyctl$link(0x8, 0x0, r0) 12:41:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x50) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) 12:41:00 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) keyctl$link(0x8, r0, 0x0) 12:41:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0x3}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x400000, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r1}, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0x0) 12:41:00 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @auto=[0x5f, 0x37, 0x36, 0x34, 0x63, 0x30, 0x66, 0x63, 0x38, 0x61, 0x36, 0x39, 0x34, 0x34, 0x39, 0x36]}, &(0x7f0000000180)={0x0, "5823d85755dbd557ca8b6318c6cbd96bf0ac85495d632ed3f095580d709ade5e79264e8260a90e61f780de4b2b4d1bad294ac4bda5678903bc9c74515ecc9006", 0x1d}, 0x48, r1) keyctl$get_persistent(0x16, 0xffffffffffffffff, r1) keyctl$link(0x8, 0x0, r0) 12:41:00 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:00 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x51fa00, 0x0) 12:41:00 executing program 0: sendto$isdn(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1008, 0x41, &(0x7f00000000c0)={0x22, 0x0, 0x9, 0x5}, 0x6) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000011c0), 0x13f, 0x9}}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) setsockopt$packet_int(r2, 0x107, 0x4, &(0x7f0000001180)=0xcac, 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:00 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$get_persistent(0x16, 0xffffffffffffffff, r1) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000180)={0x0, "61f1f92c6680a1170d8b9e87f574fc178510b41983b89369caadf93393a5a8bdc56bf32209994f6fd5f2a5875d7fd06a7adfe6868d836f12229f4f2b14804503", 0x2f}, 0x48, r1) keyctl$link(0x8, 0x0, r0) 12:41:00 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:41:00 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @auto=[0x5f, 0x37, 0x36, 0x34, 0x63, 0x30, 0x66, 0x63, 0x38, 0x61, 0x36, 0x39, 0x34, 0x34, 0x39, 0x36]}, &(0x7f0000000180)={0x0, "5823d85755dbd557ca8b6318c6cbd96bf0ac85495d632ed3f095580d709ade5e79264e8260a90e61f780de4b2b4d1bad294ac4bda5678903bc9c74515ecc9006", 0x1d}, 0x48, r1) keyctl$get_persistent(0x16, 0xffffffffffffffff, r1) keyctl$link(0x8, 0x0, r0) 12:41:00 executing program 5: socket$isdn(0x22, 0x3, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r0}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8041}, 0x24000880) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x492881, 0x0) 12:41:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) linkat(r2, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x400) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r4, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 12:41:00 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000100)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x1e}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:41:00 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:41:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x33, 0xfa00, {r1}}, 0xc) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000100)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)={r2}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(0xffffffffffffffff, 0x80083313, &(0x7f00000001c0)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 12:41:00 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x204582, 0x0) 12:41:00 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffff9) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @auto=[0x5f, 0x37, 0x36, 0x34, 0x63, 0x30, 0x66, 0x63, 0x38, 0x61, 0x36, 0x39, 0x34, 0x34, 0x39, 0x36]}, &(0x7f0000000180)={0x0, "5823d85755dbd557ca8b6318c6cbd96bf0ac85495d632ed3f095580d709ade5e79264e8260a90e61f780de4b2b4d1bad294ac4bda5678903bc9c74515ecc9006", 0x1d}, 0x48, r0) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 12:41:01 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r0, 0xfffffffffffffffd, 0x1) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) keyctl$unlink(0x9, 0x0, r1) keyctl$link(0x8, 0x0, r0) 12:41:01 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:01 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:41:01 executing program 5: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) renameat(r1, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000240)='./file0\x00') ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r2, 0x3312, 0x6) ioctl$SNAPSHOT_SET_SWAP_AREA(r3, 0x400c330d, &(0x7f0000000080)={0xfffffffffffffff8, 0x9}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r4, 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r5, 0x0, 0x0) ioctl$SNAPSHOT_UNFREEZE(r5, 0x3302) ioctl$SNAPSHOT_FREE(r1, 0x3305) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0x0, 0x2, 0xfffffffd, 0x3}}) 12:41:01 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffff9) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 12:41:01 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)=@v2={0x2, @adiantum, 0x8, [], @auto="272f95b3960032e17da449c60eb95921"}) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4}, 0xc) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0xb8) 12:41:01 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f00000001c0)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x2c}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x88000, 0x0) getsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) keyctl$link(0x8, r0, r1) keyctl$link(0x8, 0x0, r0) keyctl$clear(0x7, 0xfffffffffffffffd) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000002c0)) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000380)={r4, r3, 0x16}, 0x10) keyctl$unlink(0x9, r0, r1) r5 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r6) keyctl$reject(0x13, r5, 0x8, 0xffffffffffff2d46, r6) 12:41:01 executing program 3: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:01 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180), 0x111, 0x2}}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r3, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 12:41:01 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffff9) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 12:41:01 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x282481, 0x0) 12:41:01 executing program 3: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:01 executing program 4: add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "9f88508cd6aa66af9be8d00b3d088721769141de8e91a848e0a072afa92a9aeefd4443146dea98ff50d9a5ad83e1ac1694d90e1ad9583bc8f802898e5e5d0eb6", 0x23}, 0x48, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) keyctl$unlink(0x9, r0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26000000000000000060a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a659e895f2e67166ab9cdc2ea015ab2984f71610273593865", 0x40}, 0x48, r0) keyctl$link(0x8, 0x0, r2) 12:41:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xc, &(0x7f00000000c0), &(0x7f0000000240)=0x4) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000140)={{0xffffffffffffffff, 0x0, 0x1000, 0x2, 0x3}, 0x81, 0x3, 'id0\x00', 'timer0\x00', 0x0, 0x100, 0x9, 0x101, 0x1000}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f00000002c0)=0x800) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 12:41:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:01 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffff9) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 12:41:01 executing program 3: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:01 executing program 5: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = geteuid() syz_mount_image$omfs(&(0x7f00000000c0)='omfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="9909de3ddd315223570981120bfa2ea710db2acb787dd6dca383ee1e82452d4bf60202b51de3321cf71b1e258bba0a0593d3fdb837cc66393e6cf22aea99c5908608cc4fcce8625cc3127647c577a8fcf1778e352751f43b099678c63e4d7d07ea0ad8a8893a9a04313dd3d22bd84c607acbc3a1bfd0996872a15cd3e925c53b49515c34288b8ef7fda1209f9a5e4e4fede4272bba4d35df8285d61505fee4f19340a87dbf7098e9e0ab909cc95e09907158baee8d9bc967b1826b4119fcb8963ef59fa1896e3bcc1e7c3c87f8cbadc4c7d9e077bf56e419382436229f720131fb836c2ddf9e0e88aa95c7fcb36516d025cee1eae3a1cbcd8015", 0xfa, 0xb45}], 0x40, &(0x7f0000000280)={[{'/dev/snapshot\x00'}, {'({+)\\::\xc6'}, {'/dev/snapshot\x00'}, {'/dev/snapshot\x00'}, {}, {'G'}, {'\\'}, {}, {'/dev/snapshot\x00'}, {'/dev/snapshot\x00'}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/snapshot\x00'}}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}, {@subj_role={'subj_role', 0x3d, '^%]'}}, {@uid_eq={'uid', 0x3d, r0}}]}) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff, 0x100) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r1, 0x330f, 0xfffffffffffffff7) 12:41:01 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffff9) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 12:41:01 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:01 executing program 4: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000180)="3e3cb2c0fdaba6432e673699e63d6e9f92f126c834faa49ec04cc8ef5c62e4a0fac0463829fc61971658e5d6edd77a32f92c0744e22adfb331201897bb173e07576b7f4ac2e80c25196f2fcd715f5c2fb590a8914567133d2ebed949ff64cc9a612cb3f2c305550990869b4bd9aa23ede98fe820a5688a7beeff7aed8f7093b6d01a916ae6a2dc0c895b15d4465a37b8a3d426e8fd6c7b96118ecf8ee30ced4e9ab9010498ea4bfcc97e6462cb2936a208b670c5a6e77da1cfc537e4fb1ccebec174ae29f3b77e578f5762bf11013b57243489da4ee63934db06e2d7195b62670c5bb2830317b0fcb9e9a55feb81419b4c0286a7f05b65c9d44c79926a90457729fa13809a1f18b01dca97990364ab6eea98fc46ecb4108e3924315eebee4c7c1e63beb296d0ab35b375c7cff07a8fad937b8663f198d813988e51b321784aced8710cbb740e9b67d1b1bdf5601ae409fe9e44398885a8b320666337973c18c2b2a207bf9abef4e785e48b061866b25665c96dffe52e54b8915f9eea5b9450c0fa9f56a4c2f9c47b8462106c1a985e6559bce4dcebec98adb99b05bb3e7d077b73303ab25b5b3a2647a828bd91015e1e21915253b97db1d2aefdab8e3914a6af7974b5f092f601a5f20b02ff15a69ff627a79a3511b1b68be8a0af60e45cb1bda86e8dec995111c619aeebf0120e8e1769928a92dc7f606ece74a56b43578fcfca96de7774bb72d22713444ced1648d552dd12af9fb94f13f7ca6a9e32c890c365a903540abf15df184930b89e7850a57933ccfe429de6211208b95ec55eea3f2b17ea98d197202d7513eb002472ca339bc425e7040d81ebd0f123aa2085352345b15f41e42ec8d61a56ff497405dbabb3d96a3cb93e5db4344ed4e768fc06ad17ac0297fb46c66a1076368bc1d6c649ec02e438cfa2adf59b9cfacc8458a0b5d1d807a7c5f811b21ce968771b9aadbc0b1bc17f196e9869e420f127215e9cbf4bd58415580f8642584a4985385d018f3e62945a591d72f0a46cf99170a85d6f11b91281d7edbd3fe6fe74f6bb1b145591cf578a5815e72355e83ccefd005c28d16b97227d287c2aec33d7709579fa98863b5c845ff15d41975ff73f68bcd40949010606671d11df6b5a897c9f6d20b4f7ef83523a44f4f1e6fa21491300df5c002cb7cf15f39a9f0ab868a5df06fa3742b2bfdbf43760f47aefa655906aeaf32daf44bf071dbd9fb6688a270fccf31fbb41f74bf5f5bd02fb4bb5ea38c082f90f718b000d6574102afb1ec462f8aa99289d10f430d3595ef9622a58040ca49ebbf8bd59466a0a7ea758925be768619e5415128f2c6dab32188020ffb3345c5f5f13db5c3e0d561e4d6f26098dd3b50189b8d46944adc717a2f734a419881efb2e950657541d98f752b5d9132ace0eb72cf595fd6d709b77dbebbab374c2978785cc81b2e5933b2fcc7da5ced05b1f7eba23be50a02efa2a2798c110843b28740c3b2cee7b6097504c995f0ce608b2fcb1e43618b81da8fa7f1aba6ed8512ac92384db1da34c0b0d9fd1eb3458a11848ef8bbe944f76616814af23abfc6fd6c5ce2029339666098807be3c936cd93f3dd1405fe3795630b5692006bcf0a08f59c9bf96020b0bd4d54c2b0454638866fb2ddb6fce9ef4878719e35ae3234c37d6b11236e18b5001cf72e4634ecace3f4062e0e0c266c855da70cb03b3e01c8ca74fb356f7bdf444c68918ca94058fdf0f39c950959b9bc28b6c21578f069481ccae8c50cfb00b17d88ed882f57adfd20afd12cdd5f9011334934c825d6cca84df90339c5af67f22b8604463d54d217fa2a3474c9b217efc1f4fbea5c62d6c1b6a533e38176026715374701ef96e85ca67d6a196850bed503bbc462bcfb54378c3b6c3660e05765d8ff8f4117589eda7bc987a0f34328b7060f6dca0e834b5cae9b386ae3bbccba04e9ceb20b925f6075c002aa58925f4a7a0e8fffea44f40e3883ed847c6018a359b0ff39ca62a105487484d11d146fffcbacf6d74185542e56627e4ab84c13993914082883ae91e847a8870ee2a19ec457cbf183af3b8b5c26df0a6a0e7df24670c42fbf21380d43c47e947ff4cec7af63f123e0303548789ee80c5ca5dfb0facec878ae6b987b12ea96abe8080a30a6a113ab83086011e7e8e03bb6b14400380bb8d26a869c6cd69d8f4a2c3c8c8a1b13b3880431609aa81deb67fa38aa8789c4a8e76c7329ae26ea52327a87dc5273d134aa81537828c81f9fdddf8eaa3a4e4a2f09659559ec3faa4b94bc1d47ea0ed387ab2a7853820742c89192df5c86eba3cdd9cab70445433850d72d74e6ab7f5c8e65dfca4f44e6a13972d1820e9bc44f43a470be4ad023d956d75f0ffe3aa85b5b6ca6175f755d9780b246ab51d510d9c8cbba2cdba6d8bd4f2e678fafb23a2a841642d84a9c0e3529bb2a3849022744d3afbaca6cdf7f393ae4f8a193d10dad12c49b8e2b3102e05067f4a0a57c150436a1693668bbb83b6c9f09369518297c5cfe26d0a06bf87dfbca0a00bd1a5dadcf59d07fb55415ee06fe37ed2dc96def08691d988865275b98c4b9a81bd0c683a54031449a6e8b9baa806143e256b03096ce505cec71baf1c3173f75988dc00cbeccd9d8f1755977f0bcab3f1ebb7d978ef73f3c51f23a38ad856a6b753a1584d7cdd88f5a7b8c31873d5b44f73c58e09fa8362d9dd60be87c4468a3774dc0a6a3804576a2abeb641b52db3240e39f7013a6517c12825c6f358d483f57640397da9c740ea629f1271f21a599d408eb204792ca3d78285573f5ba02235c69b713e93611d537bb11ce47c403bc97937c35c4c39a0fce7b080316bf6158ca473abe9c5c9efe2f3089777521850900a547c1fb1df2ee8a97122ab9b747455a2e513d747571c57288a3a104faacab9f7172199f52f91bfb017af4e870fcb5ef644a220ec78a4595dc2995e008b9786fbb44b7a79580669d02fd73a8073640f4ed1578a93539f8c80f5c51adbb2f49a63f2ee3b841c539fae95e49b3b77dff3f56c72679f97dcb99389fc982d9b1f6e5904dd91cdc0f4919f28977997165f5dc70f101c80c2b5fdbb4b05e2af6cc34f5fb2f055124e3cdaf6abb8b31eae1856c9f3dbe89794bab68523c9803f1aa802966379b430504d790bd7cb9b8b1f0f220cfaca90a0249de82bb60a65b232ee8decbc63589b8f0611a2e5c5b31195602485bd2cfea4581e4dff2446eea75bf6f9362a2862b4263ee737cc80a29bbdcd6ee217f108db53ace95635461492146f7079448d553b75dcc6170cdcd5c3f32f5adc6c645b94a1d65fb7a3aa5e9e1229096ed115cf69a45b58698bc7a0de4a95ef474cf7b5900dbf922454e6a12a14dcb591e597266c015da54c08d481ba7cbdc6403ecee3d88b17a8e00d76537fb949bb8ad35cf9f87820620c094288e3c71cdc7bc13f3294e2099b7a58e33f80ac5585c8cb187d0285917c196b683756a6c54b2c5f7edc22afdd542f8e2bc37ed1a0030ea26bcb5b8b5adad928ada2d6e5d2fba4efb0f592b846f431ceef3e703f6e83e79a04c41303fd7a49ea3dceab3d6a6369f7269c5cf2fa30d058267ae1c4ba6f5e7dbe6663bb194672c5189fc22a516c3a6fa7d12af411a0864a3e73bdf55b0efd951b6a357f2a2e6eae75a1b5b44a360bea8220b658c9577734f05916ffbca892a0c9b195359dbd1038d51554b49ece7c19bada9859874e61000219b92fdba044c46ca894bff5690346ff82169f697f9aa5bddf7e8959862f8619242c8536b5de61d7c3136a4bc7bf905cfe634a1740002cf449729dd27e25a66743147b4e1890c63bb98a9b4bdaca529363b3e4bca3561f56acd0a2121171de8544e94b41293e1a9b02f8764f8cea1329663b5dc5957081090b623845ed64d5c0db3df5542b0081807eb6864ae51dc9488755cf9d3692f8b78587c900b9c64ecced3b6f8cca155a4d38ea99ccf0dc880c4528f91b83623a6655fb1e719e693c4557b96b2de7d0b423d822786d1c7751e5c993cc176709c725bc8fd26756e5781327d4a44136f26f431eb0bc6a6b3d3ce701ef77244165bf9e6d09b3829ce256277c714badd5f8a47c6f01d640bf1be2a39ed7869ebeb835cc47fc40a84c9e495b9196850fe2c328faf8555a5071920c5cdc175cdf122242bd6c65eac9026b6aeefa108d53851115fb5eedcdf63c0aec46468ea96b9664887bccc64a2e702eb0f3be778f9a4e89ee46c3ae2e475f19466040c1a71281680dfe738d101f2f996067a82085194f69cc7a0284839b51f6a65ea4a35ad2cfed40b41560c022c53e0108c934ab546501ab75ba0a18451a252f86239301bab92a94366fe8c8edfc7e074c8a17c8fd2925ce05c1e055f94bc617de1c3c8b66d1d681aab591686c9feb66905509014fff010e8c38bf8d4db0402346be643e07ab2e180c9f10aaed3ac464b7c9c6a9e682bf2426022922faf462faf5eaa7c2b8e845a076a6631376c6095955609332959b53d4a001c6276f17fa13eb1046e0bb1bcd4649b1501eb1c7a5836572dbd40472b3ebf352a102a7da3b408042aeaf5bcf9fccf094b7741c573d0c060075694ab05ad031108cbcb332b62e32095de10e35f346cdc44c07b576e5326a8dc5f75df0e33fd012ded8d7dfbff55fcaf237c5197c5d16ec9f5701c0f75ee9721ff173629529f93fb1ac9aec17d164bbadf04fab855758465c1d29b7f8ab736f6ed52af9d4c5962fe63754d70fa86e87e8dc5e6daa2ed968fa25435d2187f31c1191b7665357ff603cdc4e8a6834eee625a638e2f7b8931401bf4713ff0d10812ef1081d057b50f638dc9bc9c3d0a9dfc2e12c48bc257a21219bc16431a851ae55d4aa889c6878981ed130ed18ee22e82dab999e6378902fd42d7d558f0d3bbfb48717ad8a1064f96ebb8aee048c8455e9ff166a315158fd06249f893062bdf18e5c8454741c3cf26af833383ae1abdd87132802e527182d513508517c12c0c98f6dc4d25dee3f221f9d784883410f82e9a50a7f33a0ac36fca8db4349aef06f5746bdd72f78bc03ba95930bac3ea4771c8b87d8eb11f5c089df1cc99d0b8fdc4b473ed89acc1a0674a37d43fe59eb351680579306d339243f0567ee3876508e0c012cc73a25305deb957739047f2b9677e360a4a7076d60205fa18c8b71fd22917a0c398e6c729e2c47da6c428530a382e8ab33b23ceb39bf26d91ad10f5bc0a8bf0b5116c1e75a761ae6887b0fc48e3abba68109461e0a018b701b54a9442cea7daa9aacefb14fbc21debe78d6cca0febc3345c697b075a45bf54e52bb564bfed081d58f5753812000190184254c65b44644c9f5eac29f05e0be3d918f413f101caf7bd68528de54c14c0265672206aa4a889119a69f9041d0651dcbe8b4ea56ee17bd6a27f34e38a4821684c9f19f1fb3155da41f0c7478d6edd118b33e19e1663be1a91c22827c3c11d3f8d014edbe5a7d321f6890670e2a1a627668e6b02c74703ad2d7e517fd17e427e4974143c6d21aa8255011d0b4ed566e98edf24b87ea46f6cda0461e0cbb4bb95ef02daa12e1269291e7b2cebc56ffd217b6f59e79ade17ff8486bd17114fde9c23f97439d062cb680ef2ae180b978070f6e2cd51ff122f9d909a65be64f16d84f438f69d22260a1533f03b30f0434decc8858fa9107da38c0178de9513f25b81efc9b182c2a183efa0978751ce1644aa9d5d4a13a5fcee1326e83e17136ced72bb4786feba9ba12f466b5fc0cd216db10a126d78ec1f813a17d9f0d4bcbbf69aa503e9d", 0x1000) r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) getuid() r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) statx(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000011c0)) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) r4 = add_key$fscrypt_v1(&(0x7f00000012c0)='logon\x00', &(0x7f0000001300)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000001340)={0x0, "21ba372f51b5150931aedddf9a65affaf21f7e6117a5af8e6190ae901fd7e4d7a0ed0987c82b02501880eb755294b7b00b31f6384e7a754f35f3361e5ff1135a", 0x13}, 0x48, r1) add_key$keyring(&(0x7f00000013c0)='keyring\x00', &(0x7f0000001400)={'syz', 0x3}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r5) r6 = getuid() keyctl$get_persistent(0x16, r6, r4) keyctl$get_persistent(0x16, 0xee00, r1) 12:41:01 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffff9) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 12:41:01 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_UNFREEZE(r2, 0x3302) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) write$snapshot(r0, 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000100)={0xa, 0x4}, 0xc) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r4, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x111, 0x9}}, 0x20) 12:41:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) memfd_create(&(0x7f0000000040)='\x00', 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000140)={r1, 0x7f, 0x8001, 0x10000, 0x7, 0x127, 0xfffffffd, 0x4, 0x7, 0x2, 0x2, 0x8}) 12:41:01 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:01 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x260c03, 0x0) [ 667.103228] print_req_error: I/O error, dev loop5, sector 0 12:41:01 executing program 2: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) [ 667.143669] Restarting kernel threads ... done. 12:41:01 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865", 0x1f}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r4) r5 = add_key$fscrypt_v1(&(0x7f00000001c0)='logon\x00', &(0x7f0000000200)={'fscrypt:', @auto=[0x63, 0x33, 0x6f, 0x36, 0x1, 0x30, 0x64, 0x62, 0x39, 0x30, 0x33, 0x64, 0x33, 0x36, 0x30, 0x32]}, &(0x7f0000000240)={0x0, "729400867ec7ce806c9220ae4a3ee30281129d4ad3535d2be8f68960ef15cab36d3aae018be5270d65138513fa4a11e1ab9f9ecb7f82a4a629696956fd37e149", 0x16}, 0x48, r0) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r5, 0x0) keyctl$link(0x8, r1, r2) add_key$fscrypt_v1(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000340)={0x0, "f02fb165efb3531cdad95fc2adc14368a3e47a600901ef935788f830e8f892039711933542b62a1358aabef765f9d55c07127e5ecd4fa5d3ea69d7908a1055e9", 0x22}, 0x48, 0x0) add_key$fscrypt_v1(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000440)={0x0, "a9929d3c29d14e54f90f380af84cc643b0042cfa7b84de899062027c7adc5308cd8e9ac1d2c695d5b7be3b6f5b8c185daf217c0a60078673de57c394aad0338e", 0x15}, 0x48, 0xfffffffffffffff8) keyctl$link(0x8, r0, r4) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$unlink(0x9, r0, r6) keyctl$clear(0x7, r0) add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, r2) 12:41:01 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:01 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x800, 0x20c000) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) [ 667.226409] Restarting kernel threads ... done. 12:41:01 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 12:41:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x1a76d9ed2f75446f, 0x0) r1 = openat$incfs(0xffffffffffffffff, &(0x7f00000002c0)='.log\x00', 0x200, 0x4) bind$bt_rfcomm(r1, &(0x7f0000000300)={0x1f, @any, 0x4}, 0xa) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000100)={0xa, 0x4}, 0xc) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) 12:41:01 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x61cd00, 0x0) 12:41:01 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000180)={0x0, "28b78516e115ada0b886a06fe57a17f47d23f4980fc94312a18712ae3ca1320d8e3f4e8f8253101cffaac7bfa2368db1bdf4ed9cfcbacebf5be77c9671004250", 0x24}, 0x48, r0) 12:41:01 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:01 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 12:41:01 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) bpf$LINK_DETACH(0x22, &(0x7f0000000140)=r0, 0x4) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x6}, 0x10) openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x9c8c0, 0x46) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000100)={0xa, 0x4}, 0xc) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 12:41:01 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x165881, 0x0) 12:41:01 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0x9) 12:41:01 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 12:41:01 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000200)={0x0, "85158eb8037766c099ce124aa7cbd78dbaf7859c90244af6e02b1c32b1d326b79df8b53b891bb2b613ffc29da81623b94ba2eed66411b629ee4b62cc2595a029", 0x13}, 0x48, r0) keyctl$search(0xa, r0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x3}, r1) keyctl$link(0x8, 0x0, r0) [ 667.460732] kauditd_printk_skb: 1 callbacks suppressed [ 667.460740] audit: type=1800 audit(1610455261.900:15): pid=16079 uid=0 auid=0 ses=4 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name=".log" dev="sda1" ino=17370 res=0 12:41:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:02 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000080)={0x0, "0763e17a26ff07e424e1f05158f3834a65df6f5f0200fd69b9cdc2ea014ab2984f7161027351a351e9000000000000000100000025fe0200"}, 0x48, 0xfffffffffffffffd) syslog(0x3, &(0x7f0000000280)=""/239, 0xef) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000680)={0x4002, 0xdc, 0x9ff, 0x81}) keyctl$link(0x8, 0x0, r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x38, r3, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x80}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, [], 0xd}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004080) openat$incfs(0xffffffffffffff9c, &(0x7f0000000380)='.log\x00', 0x0, 0x156) r4 = syz_mount_image$omfs(&(0x7f0000000100)='omfs\x00', &(0x7f00000003c0)='./file0\x00', 0x10001, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="5dbb149e10dd6fcd492a3f57ce6da31b6ce08fe73e8353353a4b4f707c5a85e505142a03ea94546d2ebc3918fa18d07b1e4a317bdf65d3e83fab5ab58e978147ad6171e7bb3c2cb21f78ad65e5", 0x4d, 0x5}], 0x82, &(0x7f00000004c0)={[{'#\xef-\\(\\/}[{'}, {'fscrypt:'}, {'\x8bH'}, {'fscrypt:'}, {'fscrypt:'}], [{@pcr={'pcr', 0x3d, 0x28}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@dont_hash='dont_hash'}]}) name_to_handle_at(r4, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x8d, 0x6, "154d894e5db766a9df22b73f60dfa1b742d234eece6923b51273c15abc367b15b0ffd89f0d8fce5154dc1f28197f634b01fe234f560ceb99f459db40fd8c10e4f5b9ebbd661a378c1112aeab732ea22922636ddbee1f7f939b32fa97772d2f089b73a79cabecbab8a864b9123a0afce5940a9776487b76c73e3260c7b6efb75f145a1e79a5"}, &(0x7f0000000240), 0x0) 12:41:02 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:02 executing program 2: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 12:41:02 executing program 0: r0 = getuid() r1 = getuid() statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x400, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r0, r1, r2) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000080)=""/105) setresuid(r2, r1, r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000100)={0xa, 0x4}, 0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @dev={[], 0x40}}, 0x10) 12:41:02 executing program 5: r0 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r0, 0x40, &(0x7f0000000040)={0x11, 0x0, 0x5}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) 12:41:02 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:02 executing program 1: write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4}, 0xc) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0xa}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r2}, 0x8) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r1}) 12:41:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f00000001c0)='logon\x00', &(0x7f0000000200)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000240)={0x0, "5c75fa3a704f9929fd7443ce9d2cf8fd8dffedf52857d85f5c66fee17733ad5e242bfa8c535d10e7639810517bc89ab0290eba830b2874fa3f0afc84b652ce0d", 0x34}, 0x48, r0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, r2, r1, 0x1) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$search(0xa, r0, &(0x7f00000003c0)='.dead\x00', &(0x7f0000000400)={'syz', 0x1}, r3) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) 12:41:02 executing program 2: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 12:41:02 executing program 2: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 12:41:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:02 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) [ 667.746667] ucma_write: process 5845 (syz-executor.0) changed security contexts after opening file descriptor, this is not allowed. [ 667.775890] print_req_error: I/O error, dev loop4, sector 0 12:41:02 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000100)=0x7f, 0x4) ioprio_get$uid(0x3, 0xee01) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) ioprio_get$uid(0x0, 0xee00) keyctl$link(0x8, 0x0, r1) 12:41:02 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x123480, 0x0) 12:41:02 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, 0xffffffffffffffff, 0x0) 12:41:02 executing program 2: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 12:41:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2, 0x0) 12:41:02 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:02 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000040)) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/timer\x00', 0x288041) read$snapshot(r0, &(0x7f00000000c0)=""/226, 0xe2) 12:41:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4}, 0xc) 12:41:02 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$link(0x8, 0x0, r3) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='fscrypt:') add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000240)={0x0, 0x2, 0x8, 0x1, 0x1}) keyctl$clear(0x7, r2) 12:41:02 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:02 executing program 2: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 12:41:02 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000180)=""/159, &(0x7f0000000240)=0x9f) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r0, 0x8008330e, &(0x7f0000000100)) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0xf3, r2}, 0x14) 12:41:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) ioctl$IOCTL_GET_NUM_DEVICES(0xffffffffffffffff, 0x40046104, &(0x7f0000000080)) 12:41:02 executing program 4: ioctl$SNAPSHOT_PREF_IMAGE_SIZE(0xffffffffffffffff, 0x3312, 0x30000000) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r2}, 0x8) ioctl$IOCTL_STATUS_ACCEL_DEV(r3, 0x40046103, &(0x7f0000000340)={0x5, 0x7f, 0x8, 0xff, 0x84, 0x6, 0xff, 0x7f, 0xb4, 0x5, 0x20, "17c1d766dc57feafcc1400d0712c1f53b2913bb2793eee91739586c6b9445061"}) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f00000001c0)) recvfrom$packet(r2, &(0x7f0000000200)=""/225, 0xe1, 0x40000000, 0x0, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000140)={0x0, "1763e17a26e64be40800000000000000093c354f7f384f0b75caad3da3a9e8823153f81258f383fad3df6f5f2e67fd69b9cd7351386500"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r4) 12:41:02 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:02 executing program 2: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 12:41:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000080)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:02 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x694440, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 12:41:02 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 12:41:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$link(0x8, 0x0, r3) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='fscrypt:') add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000240)={0x0, 0x2, 0x8, 0x1, 0x1}) keyctl$clear(0x7, r2) 12:41:02 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000080)={0x0, "0763e17a26e64b6408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67aaa87e79c2e4015a02984f716151386500", 0x4000000}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:41:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$link(0x8, 0x0, r3) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='fscrypt:') add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000240)={0x0, 0x2, 0x8, 0x1, 0x1}) keyctl$clear(0x7, r2) 12:41:02 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:41:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(0xffffffffffffffff, 0x80083313, &(0x7f0000000040)) 12:41:03 executing program 4: keyctl$get_persistent(0x16, 0xee00, 0x0) keyctl$link(0x8, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "13380bdccee6d7cdaefc830ddb15d8d0dd8fc2c736207e836ee14ad5fe531ed9bb19fe4428ae7afca9a55d42a7656142ff100246721571db0817b84a5d5cf521", 0x1a}, 0x48, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 12:41:03 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2a8c00, 0x0) 12:41:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$link(0x8, 0x0, r3) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='fscrypt:') add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000240)={0x0, 0x2, 0x8, 0x1, 0x1}) keyctl$clear(0x7, r2) 12:41:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.pending_reads\x00', 0x10000, 0x4a) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000080), 0x4) 12:41:03 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:41:03 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200040, 0x0) 12:41:03 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:41:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$link(0x8, 0x0, r3) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='fscrypt:') add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r2) 12:41:03 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) keyctl$unlink(0x9, r1, r2) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'fscrypt:', @auto=[0x33, 0x35, 0x64, 0x65, 0x61, 0x62, 0x34, 0x37, 0x31, 0x62, 0x35, 0x33, 0x32, 0x32, 0x39, 0x65]}, &(0x7f0000000200)={0x0, "ba9cc770c5e7dcd63502b245a93ba65254c75dfbcc7526845ed5bb5c6910d15c66e4f95c95978c7d659f948273b0f9706ca9b903f4d4c5014955165166d35048", 0x3a}, 0x48, 0xfffffffffffffffa) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$link(0x8, r3, r3) 12:41:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xe0, 0x14902) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000040)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r3, 0x0, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r3, 0x80083314, &(0x7f0000000180)) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4}) write$snapshot(r3, &(0x7f0000000200)="16143ee625f5f1ec3febc2ca", 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0], 0x2}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x13f, 0xa}}, 0x20) 12:41:03 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2e4500, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000040)) 12:41:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$link(0x8, 0x0, r3) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='fscrypt:') keyctl$clear(0x7, r2) 12:41:03 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0x0) 12:41:03 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) keyctl$reject(0x13, r0, 0x6, 0x6, r0) 12:41:03 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x424100, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000080)) 12:41:03 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0x0) 12:41:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$link(0x8, 0x0, r3) keyctl$clear(0x7, r2) 12:41:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x40, 0x400) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, &(0x7f0000000080)={0x0, 0x3, 0xffff, 0x101, 0x80000000, 0xffffffce, 0xffffffff, 0x7fffffff, 0x8, 0x7, 0x85, 0x8d1}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:03 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x0, 0x1f, 0x7f, 0x430d, 0x7, 0x8, 0x5}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000100)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000140)={r2, 0x1, 0x6, @remote}, 0x10) ioctl$SNAPSHOT_CREATE_IMAGE(0xffffffffffffffff, 0x40043311, &(0x7f0000000040)) 12:41:03 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x10400, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x4}, 0x4) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) recvfrom$packet(r0, &(0x7f0000000180)=""/67, 0x43, 0x0, &(0x7f0000000280)={0x11, 0x7, r1, 0x1, 0x5, 0x6, @random="fdc63527f93c"}, 0x14) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x4100, 0x8) fanotify_mark(r0, 0x1, 0x1028, r2, &(0x7f0000000100)='./file0\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @aes128, 0x2, [], @b='\x91*\xe5\x10\xa4Xr:\x83\x9a\x9f\xadp\x158\xac'}) 12:41:03 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$reject(0x13, r0, 0x1, 0x3, 0xfffffffffffffffb) keyctl$link(0x8, 0x0, r0) 12:41:03 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0x0) 12:41:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$clear(0x7, r2) 12:41:03 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x600000, 0x0) 12:41:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x10, &(0x7f0000000000), 0x4) 12:41:03 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) keyctl$link(0x8, 0x0, r3) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='fscrypt:') keyctl$clear(0x7, r2) 12:41:03 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "824e5a043c467c0f2349f6dac756e611867b4aed51d19781e14f68015e5fa2207e1ce5b51b23f6a544ef7e45c007266e0bb28a5adbefba500229229fc02dae0f", 0x1b}, 0x48, 0xfffffffffffffff8) keyctl$link(0x8, r0, 0x0) 12:41:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r2) 12:41:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:04 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x260002, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000080)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x800, 0x0) write$snapshot(r2, 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r1, 0x330f, 0x3) 12:41:04 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x10400, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x4}, 0x4) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) recvfrom$packet(r0, &(0x7f0000000180)=""/67, 0x43, 0x0, &(0x7f0000000280)={0x11, 0x7, r1, 0x1, 0x5, 0x6, @random="fdc63527f93c"}, 0x14) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x4100, 0x8) fanotify_mark(r0, 0x1, 0x1028, r2, &(0x7f0000000100)='./file0\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @aes128, 0x2, [], @b='\x91*\xe5\x10\xa4Xr:\x83\x9a\x9f\xadp\x158\xac'}) 12:41:04 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xffffffffffffff55) 12:41:04 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000001c0)) ioctl$SNDRV_PCM_IOCTL_PAUSE(r0, 0x40044145, &(0x7f0000000100)=0x8c) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0750e6d149e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, r1, r1, 0x0) keyctl$link(0x8, 0x0, r1) 12:41:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) keyctl$clear(0x7, r2) 12:41:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) keyctl$search(0xa, 0x0, &(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000040)) write$snapshot(0xffffffffffffffff, 0x0, 0x0) syz_emit_vhci(&(0x7f00000001c0)=@HCI_EVENT_PKT={0x4, @hci_ev_channel_selected={{0x41, 0x1}, {0xc9}}}, 0x4) ioctl$SNAPSHOT_CREATE_IMAGE(0xffffffffffffffff, 0x40043311, &(0x7f0000000080)) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) 12:41:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x400600) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0]}) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r2) keyctl$clear(0x7, r2) 12:41:04 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x10400, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x4}, 0x4) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) recvfrom$packet(r0, &(0x7f0000000180)=""/67, 0x43, 0x0, &(0x7f0000000280)={0x11, 0x7, r1, 0x1, 0x5, 0x6, @random="fdc63527f93c"}, 0x14) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x4100, 0x8) fanotify_mark(r0, 0x1, 0x1028, r2, &(0x7f0000000100)='./file0\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @aes128, 0x2, [], @b='\x91*\xe5\x10\xa4Xr:\x83\x9a\x9f\xadp\x158\xac'}) 12:41:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000001c0)) linkat(r1, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000640)={@id={0x2, 0x0, @d}, 0x21, 0x0, [], @c='abcdefghijklmnopqrstuvwxyz0123456'}) r3 = syz_mount_image$omfs(&(0x7f0000000200)='omfs\x00', &(0x7f0000000240)='./file0\x00', 0x2, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000280)="66312ec9b4a3cbf94652db6e8e00e05e1686273c2595fbcb096892fbcf24fbaffb83b2193bda680bd900de63c018e7ea5c56645cdd27afda73a722311dbfb948933433baf639e45f1ea0e9a179e77607c8b64227fdbe05401c642ed9501b6340b6cea5248d613d7c3542246cb437dc8028222ec23c318c2f3b6f021c66", 0x7d, 0x96}, {&(0x7f0000000300)="1e2881291228b952d100a20650e2eee2100091f4453a70942bcd673231adb7659345e41d88366087ecc7fc47630242ab5d7dcc7ab2aba0c927a17cd9f07ac4d0156d2310a3c77011968411bbba88282d60846788baf16d5e76ae60ddd38432bdd4cd3f2cd94a954d9ded36eef26f", 0x6e, 0x4}, {&(0x7f0000000380)="ca68afc0699155cc5d8a47", 0xb, 0x1}, {&(0x7f00000003c0)="6d4a7846b4f815d38222809c20c580aeac060aa967954e9465f3ecf9d3b3381c688e16e1bee4ee07274f9ec8e0a1a1c8c80033c9d97538b6254bb5a04d46956342ffbb5c8d51b492c8be86e0f5433737479320fbab33d63890f4a7fccac329fe91be2201282a8342ef331ea3267751adb258ac2747e5d43768f1783e2c64f78ae8d39583706777a39f16335d4b80bed47bda519244f14a7cab6ecaf078fb6989677b2cfd107af04b831644715d61501ef6fdd528a897d8cecc0ac796075b605598f10eff15e4e10d11848192798d4af26fd473f07d", 0xd5, 0xb0}], 0x10, &(0x7f0000000540)=ANY=[@ANYBLOB="2f6465762f696e66696e6962616e642f72646d615f636d002c2f6465020000000000000062616e642f72646d615f636d002c2f6465762f696e66696e6962616e642f72646d615f636d002c2f6465762f696e66696e6962616e642f72646d615f636d002c2c232c2c66736d616769633d3078303030303030303000003030383030312c646f6e745f686173682c00"]) mkdirat(r3, &(0x7f0000000600)='./file0\x00', 0x42) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000080)=""/6) 12:41:04 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0763e17a26e64be408e1f051a560a14d753c354f7f384f0b75caad3da3a9e8823153f81258f3834a65df6f5f2e67fd69b9cdc2ea015ab2984f71610273513865"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) [ 669.770270] BUG: unable to handle kernel NULL pointer dereference at 0000000000000030 [ 669.778285] IP: amp_read_loc_assoc_final_data+0xe6/0x190 [ 669.783723] PGD 79087067 P4D 79087067 PUD 79088067 PMD 0 [ 669.789246] Oops: 0002 [#1] PREEMPT SMP KASAN [ 669.793715] Modules linked in: [ 669.796899] CPU: 1 PID: 8039 Comm: kworker/u5:2 Not tainted 4.14.214-syzkaller #0 [ 669.804496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.813837] Workqueue: hci1 hci_rx_work [ 669.817802] task: ffff8880959ae000 task.stack: ffff8880946a0000 [ 669.823851] RIP: 0010:amp_read_loc_assoc_final_data+0xe6/0x190 [ 669.829811] RSP: 0018:ffff8880946a7a08 EFLAGS: 00010246 [ 669.835149] RAX: 0000000000000000 RBX: 1ffff110128d4f41 RCX: 1ffff11012b35d1b [ 669.842399] RDX: 1ffff1101602d1ab RSI: ffff8880b020e540 RDI: ffff8880b0168d58 [ 669.849644] RBP: ffff8880b020e540 R08: 0000000000000000 R09: 0000000000000002 [ 669.856902] R10: 0000000000000000 R11: ffff8880959ae000 R12: ffff8880b01689c0 [ 669.864156] R13: 0000000000000000 R14: ffff8880b01689c0 R15: ffff88809f2c6c00 [ 669.871407] FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 [ 669.879612] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 669.885475] CR2: 0000000000000030 CR3: 0000000079086000 CR4: 00000000001406e0 [ 669.892746] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 669.900862] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 669.908110] Call Trace: [ 669.910683] ? amp_read_loc_assoc+0x140/0x140 [ 669.915158] ? hci_chan_selected_evt+0x176/0x360 [ 669.919899] ? lock_acquire+0x170/0x3f0 [ 669.923849] ? lock_downgrade+0x740/0x740 [ 669.927976] hci_chan_selected_evt+0x1b2/0x360 [ 669.932537] hci_event_packet+0x2260/0x750f [ 669.936833] ? trace_hardirqs_on+0x10/0x10 [ 669.941045] ? hci_cmd_complete_evt+0xb490/0xb490 [ 669.945862] ? trace_hardirqs_on+0x10/0x10 [ 669.950084] ? debug_object_deactivate+0x1da/0x2e0 [ 669.954989] ? skb_dequeue+0x125/0x180 [ 669.958850] ? mark_held_locks+0xa6/0xf0 [ 669.962888] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 669.967992] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 669.973000] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 669.978077] hci_rx_work+0x427/0xb40 [ 669.981785] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 669.987211] process_one_work+0x793/0x14a0 [ 669.991426] ? work_busy+0x320/0x320 [ 669.995114] ? worker_thread+0x158/0xff0 [ 669.999150] ? _raw_spin_unlock_irq+0x24/0x80 [ 670.003620] worker_thread+0x5cc/0xff0 [ 670.007486] ? rescuer_thread+0xc80/0xc80 [ 670.011607] kthread+0x30d/0x420 [ 670.014955] ? kthread_create_on_node+0xd0/0xd0 [ 670.019601] ret_from_fork+0x24/0x30 [ 670.023291] Code: 44 24 21 48 b8 00 00 00 00 00 fc ff df 0f b6 04 02 84 c0 74 08 3c 01 0f 8e 90 00 00 00 41 0f b7 84 24 98 03 00 00 66 89 44 24 23 41 80 4d 30 04 48 8d 6c 24 40 4c 89 e6 48 89 ef e8 c4 6b fe [ 670.042370] RIP: amp_read_loc_assoc_final_data+0xe6/0x190 RSP: ffff8880946a7a08 [ 670.049798] CR2: 0000000000000030 [ 670.053235] ---[ end trace 03deafac1f5362b1 ]--- [ 670.057991] Kernel panic - not syncing: Fatal exception [ 670.063906] Kernel Offset: disabled [ 670.067516] Rebooting in 86400 seconds..