0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 741.307172] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:05 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:05 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:05 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:05 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81ee1"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9}) setresuid(0xee00, 0x0, 0x0) [ 741.879801] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:06 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:06 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:06 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 742.554122] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:06 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:06 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:06 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:06 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 743.035767] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:07 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:07 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:07 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:07 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 743.661990] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:07 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:07 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 744.047021] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:08 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:08 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d8", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 744.635919] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:08 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:08 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:09 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:09 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d8", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:09 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:09 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:09 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:09 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 745.689936] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) [ 745.820420] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 16:05:10 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) [ 746.111942] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:10 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d8", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:10 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:10 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:10 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 746.675705] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 16:05:10 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 746.887607] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:11 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb16", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:11 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:11 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 747.572115] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 747.684016] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:11 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:11 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:12 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb16", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:12 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 748.137561] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:12 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:12 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:12 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb16", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:12 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:12 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 748.827352] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {0x0, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) [ 749.424230] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:13 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:13 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {0x0, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:13 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:13 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:13 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 749.922794] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {0x0, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:14 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:14 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d8", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 750.433068] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:14 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:14 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:14 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:14 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 750.997038] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:15 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:15 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:15 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:15 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:15 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 751.694304] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:16 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:16 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:16 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:16 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:16 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 752.540846] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:16 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:17 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:17 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:17 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:17 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:17 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r0}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 753.424205] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:17 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r0}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:17 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:17 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:17 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:17 executing program 0: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r0}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 753.852622] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:18 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:18 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 754.387922] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:18 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:18 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e4", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:18 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 754.944818] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:19 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:19 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:19 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e4", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:19 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:19 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 755.521173] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:19 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:19 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:20 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:20 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e4", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:20 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:20 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 756.146474] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:20 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:20 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:20 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:20 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:20 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:20 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 756.792830] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:21 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:21 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:21 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:21 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:21 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:21 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 757.415267] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:21 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:21 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:21 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:22 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 757.988264] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:22 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:22 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:22 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:22 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:22 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:22 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 758.647937] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:22 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x0, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 759.097464] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:23 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:23 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:23 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:23 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:23 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x0, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:23 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:23 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 759.673530] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {0x0, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:24 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:24 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:24 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:24 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x0, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 760.269872] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {0x0, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:24 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:24 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:24 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 760.860321] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:25 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x0, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:25 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:25 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {0x0, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:25 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:25 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 761.386233] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:25 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:25 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x0, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:25 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:25 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 761.730951] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:26 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:26 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:26 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 762.343375] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:26 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:26 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:26 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:26 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x0, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:26 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x0, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:27 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 762.916926] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:27 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:27 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x0, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:27 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:27 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:27 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 763.624596] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:27 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:27 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x0, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:27 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:27 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:28 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:28 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 764.182048] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:28 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:28 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x0, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:28 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:28 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:28 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:28 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 764.881811] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:29 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:29 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:29 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:29 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 765.458472] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:29 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:29 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:29 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:29 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:30 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:30 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 766.094182] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:30 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:30 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:30 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:30 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:30 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:30 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 766.879169] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:31 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:31 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:31 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:31 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 767.545100] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:31 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:31 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:32 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:32 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:32 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:32 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 768.263229] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:32 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:32 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:32 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:32 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:32 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 768.982044] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:33 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:33 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:33 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:33 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) [ 769.474220] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:33 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:34 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:34 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:34 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:34 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 770.178658] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:34 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:34 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:34 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:34 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:34 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 770.835443] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:35 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:35 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:35 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:35 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:35 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:35 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 771.458203] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:35 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:35 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:35 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 771.937204] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:36 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x0, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:36 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:36 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:36 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:36 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:36 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:36 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x0, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 772.717446] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:36 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:37 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:37 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:37 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 773.255015] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:37 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x0, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:37 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:37 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:37 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 773.841161] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:38 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:38 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:38 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x0, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:38 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:38 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:38 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 774.461342] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:38 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:38 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:39 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x0, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:39 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:39 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:39 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 775.094749] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:39 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) [ 775.428334] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:39 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:39 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:39 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:39 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x0, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:39 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:40 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 776.053697] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:40 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:40 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:40 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:40 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 776.600466] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:40 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:41 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 776.994692] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:41 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x0, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:41 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:41 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:41 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:41 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 777.687046] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:41 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:41 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x0, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:42 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:42 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 778.177782] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:42 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:42 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:42 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 778.695325] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:42 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:42 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {r1}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:43 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:43 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:43 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 779.208952] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:43 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 779.442500] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 16:05:43 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x0, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:43 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 779.683696] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:43 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:43 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:43 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x0, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:44 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x0, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 780.189275] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:44 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:44 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:44 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x0, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:44 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x0, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:44 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 780.787310] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:45 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:45 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x0, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:45 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:45 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) [ 781.418594] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:45 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x0, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:45 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x0, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:46 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:46 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x0, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 782.030815] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 782.049156] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 16:05:46 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:46 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:46 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x0, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 782.500529] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 782.547887] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {}, {r1}, {}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:46 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x0, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:46 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:47 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:47 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0x0, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 783.070520] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 16:05:47 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:47 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 783.251709] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:47 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0x0, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:47 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:47 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 783.811939] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:47 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:48 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0x0, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:48 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:48 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:48 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:48 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 784.509765] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:48 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:48 executing program 5: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:49 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:49 executing program 3: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:49 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a1e5575a997ea2074729e12b1888023e2e95eae9dc53b2b7f6cf506fe69c52d16381e66a475f0fe93bbfaa3552ffab18c295063a2be7e787fa713ece760ed07b6283ca047614753d90e87d53e59856545a7838f0f25346b6e363a6dc6ec1f70284d89c011549a45f8d21948f78394a2948e7f5931d1758fb0529b4840dfec24c7627b5d505ba28b891643fd920756a7b63481f7f56bf8174f000000000000000000", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6673757569643d30323739616338322d633431512d373661792d323530332d38363263323263342c66736d616769633d3078303030303030303030303030303030322c646f6e745f61707072616973652c0044cda490334c120f5b61ed8d7f75f1e14ccf2d964e787212e20e377da1cee0a9afcb81b269645aee9bdd66f1b6304c8b01af10e2a091794c48b407592898673443246049aec74eb547b78ca3cec3fcf99b34c94dfa27b2b6cd8e9aa0d71f0b1de4ec427f4be6c10f1a0cd6bb20f5a42a2c0188ea6532e690d400281235191fc4f680296e92981fb7a15bfef6e5d77ae78abcbaf81e"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000006c0)={{r0}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 785.113534] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:05:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1002402, &(0x7f0000000040)=ANY=[@ANYBLOB="7002419577485a255a7314f9b93d5bb2a300d17c156b86af42defd43f6787ae82b2196c8338f"]) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='net_cls.classid\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "dc66b42d73a84c"}) r5 = syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041b00)={0x6, [{r1}, {}, {0x0, r2}, {}, {r0}, {r0}, {r0, r2}, {r1}, {}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0}, {}, {}, {}, {r1}, {r0, r2}, {r1, r2}, {}, {r1}, {r0}, {}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {0x0, r2}, {}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {r0}, {}, {}, {r0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {}, {}, {r1, r2}, {}, {}, {}, {r0}, {}, {r1}, {r1}, {r1}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r0}, {r0}, {}, {}, {r0, r2}, {}, {r1, r2}, {r0}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {}, {0x0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1}, {r0}, {}, {r0, r2}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {}, {}, {r1, r2}, {}, {r1}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {r1}, {r0}, {r0}, {r0, r2}, {r0, r2}, {}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {}, {r0}, {}, {}, {0x0, r2}, {r1}, {r0, r2}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1, r2}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {r1}, {0x0, r2}, {r0}, {}, {r0}, {0x0, r2}, {r0}, {r1}, {}, {}, {r0, r2}, {r0}, {r1}, {}, {r0}, {}, {r1}, {}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {}, {r0, r2}, {}, {}, {r0, r2}, {r0}, {}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {}, {r1, r2}, {r0}, {r1, r2}, {r1}, {r1, r2}, {r0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {r1, r2}, {r0}], 0x3, "5d5b0ed0a728a3"}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66163d4c38f1fa4edc57c8c0f31740440a2fc0e740f11239e2d01123fd7be70092e93a1860ae8fbbb16869f94716df5bc191f623c451028024c417dcf14a8b4462e0447e90aab1670eee9ccc666a70beac1f0561aa1799a4f79a745a86549c5cd8db6ff90dca1385886e17443755fb44778be8ed544f334819ac9f6daa7e15d80a736016bba95b69421d656ab3e248eb4663ab5a79816adbb6f59767689543eff45df2d223", @ANYBLOB=',rootm', @ANYBLOB, @ANYRESDEC=0x0]) 16:05:49 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000600)='overlay\x00', 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB]) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="58f612dac7f3aea4442e1051fb9de7d46bbb3fbc8a0724ecc7bb8deaab3be018eef9842e6652b4f430e15faf6168bbe720af8b793bac1fa0d00cccbcbd0170870db56388a57a6cfc9698dc7fbafd90955d07b0b9e9e9c9165f91ab1063c3498fc1b98ef4322083a6c396e5d43e34c1c85fd1572e451503adc38333e04bf1ee27bc2f068904954fa3b1f824a6d819f019424c77b149cb163ad1c6e508000000e43a", @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2041, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x0, 0x0, 0x1}) setresuid(0xee00, 0x0, 0x0) 16:05:49 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x1, &(0x7f0000000900)=[{0x0, 0x0, 0x4}], 0x80800, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000a40)=ANY=[@ANYBLOB]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x40, 0x94, 0x83, 0x0, 0x4000000000005, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x801, 0x200, 0x5, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) unshare(0x20000) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000006c0)={{r1}, 0x9, 0x5, 0x1}) setresuid(0xee00, 0x0, 0x0) [ 785.507284] kasan: CONFIG_KASAN_INLINE enabled [ 785.512369] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 785.523965] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 785.530254] Modules linked in: [ 785.533459] CPU: 0 PID: 7974 Comm: syz-executor.0 Not tainted 4.14.231-syzkaller #0 [ 785.541249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.550611] task: ffff8880588983c0 task.stack: ffff8880588a0000 [ 785.556968] RIP: 0010:kobject_uevent_env+0xb2/0xf40 [ 785.562114] RSP: 0018:ffff8880588a7b28 EFLAGS: 00010206 [ 785.567650] RAX: 0000000000000018 RBX: 0000000000000002 RCX: 1ffff1100b11318e [ 785.575011] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000000000c0 [ 785.582542] RBP: ffff88809d2fc710 R08: ffffffff8b9a31a0 R09: 0000000000000001 [ 785.589959] R10: 0000000000000000 R11: ffff8880588983c0 R12: 00000000000000a0 [ 785.597324] R13: dffffc0000000000 R14: ffff88809d2fc608 R15: 00000000000000a0 [ 785.605680] FS: 0000000001eb6400(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 [ 785.614303] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 785.620372] CR2: 00007ff807c1d000 CR3: 0000000058888000 CR4: 00000000001406f0 [ 785.627921] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 785.636293] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 785.643735] Call Trace: [ 785.646346] ? lock_downgrade+0x740/0x740 [ 785.650533] loop_clr_fd+0x59f/0xc20 [ 785.654286] lo_ioctl+0x895/0x1cd0 [ 785.657836] ? path_lookupat+0x780/0x780 [ 785.661989] ? debug_check_no_obj_freed+0x2c0/0x680 [ 785.667562] ? loop_set_status64+0xe0/0xe0 [ 785.671810] blkdev_ioctl+0x540/0x1830 [ 785.676254] ? blkpg_ioctl+0x8d0/0x8d0 [ 785.680154] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 785.685699] ? debug_check_no_obj_freed+0x2c0/0x680 [ 785.691256] block_ioctl+0xd9/0x120 [ 785.694889] ? blkdev_fallocate+0x3a0/0x3a0 [ 785.699226] do_vfs_ioctl+0x75a/0xff0 [ 785.703034] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 785.709021] ? ioctl_preallocate+0x1a0/0x1a0 [ 785.713533] ? kmem_cache_free+0x23a/0x2b0 [ 785.717894] ? putname+0xcd/0x110 [ 785.721454] ? do_sys_open+0x208/0x410 [ 785.725354] ? filp_open+0x60/0x60 [ 785.728928] ? security_file_ioctl+0x83/0xb0 [ 785.733661] SyS_ioctl+0x7f/0xb0 [ 785.737041] ? do_vfs_ioctl+0xff0/0xff0 [ 785.741037] do_syscall_64+0x1d5/0x640 [ 785.745095] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 785.750289] RIP: 0033:0x466217 [ 785.753505] RSP: 002b:00007ffe90cbf3c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 785.761372] RAX: ffffffffffffffda RBX: 00007ffe90cbf460 RCX: 0000000000466217 [ 785.768648] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 [ 785.775924] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007ffe90cbf260 [ 785.783200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000032 [ 785.790502] R13: 00000000000bfbf7 R14: 0000000000000000 R15: 00007ffe90cbf4a0 [ 785.798127] Code: 03 42 80 3c 28 00 0f 85 e4 0b 00 00 4d 8b 64 24 18 4d 85 e4 0f 84 01 0c 00 00 e8 1a 83 58 fa 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 db 0b 00 00 49 8b 6c 24 20 48 85 ed 74 b0 [ 785.817315] RIP: kobject_uevent_env+0xb2/0xf40 RSP: ffff8880588a7b28 [ 785.842648] ---[ end trace 906bee416a91fec8 ]--- [ 785.843194] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 785.847699] Kernel panic - not syncing: Fatal exception [ 785.861793] Kernel Offset: disabled [ 785.865424] Rebooting in 86400 seconds..