m 5: epoll_pwait(0xffffffffffffffff, &(0x7f0000000480)=[{}], 0x1, 0x0, &(0x7f0000000340), 0x65) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x54, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x81}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x200}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000040) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x54, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x81}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x200}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000040) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x54, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x81}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x200}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000040) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x3, &(0x7f00000006c0)=[{0x0, 0x0, 0x7fffffffffffffff}, {&(0x7f0000000480), 0x0, 0xfffffffffffffffc}, {&(0x7f00000005c0)="f840db20ae9e6ecc2c2beb0a1a5ed59c919ee73b36166a6a53f30f5922e5544bbe1183b842c95c9c0a3d12cb1d2083fa876db0deb4c1c734962d20703ed935a7e7817c851743e95f694c6d490d0a66904c506ca6705c7d047b99c18b08b55d26b5df26da29b5c123b9606b8dd4d77662c9063fd7aa590f1c617c021ed61c8d489aa687868d0bdc70a46eed9ff7a48853ea58d39da5c68f7cd95743c497876980476660fbea53bb2aad87b6dab57e72757b59fbb84b149ff7157a49c1682490ddf535ef51d7155122d36d101a798a6141af6f01b892a2e3abc183f3c3f841b96f2104b9bb393bc2359a3bceee72", 0xed, 0xfff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) read$ptp(0xffffffffffffffff, &(0x7f0000000400)=""/120, 0x78) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x3, &(0x7f00000006c0)=[{0x0, 0x0, 0x7fffffffffffffff}, {&(0x7f0000000480), 0x0, 0xfffffffffffffffc}, {&(0x7f00000005c0)="f840db20ae9e6ecc2c2beb0a1a5ed59c919ee73b36166a6a53f30f5922e5544bbe1183b842c95c9c0a3d12cb1d2083fa876db0deb4c1c734962d20703ed935a7e7817c851743e95f694c6d490d0a66904c506ca6705c7d047b99c18b08b55d26b5df26da29b5c123b9606b8dd4d77662c9063fd7aa590f1c617c021ed61c8d489aa687868d0bdc70a46eed9ff7a48853ea58d39da5c68f7cd95743c497876980476660fbea53bb2aad87b6dab57e72757b59fbb84b149ff7157a49c1682490ddf535ef51d7155122d36d101a798a6141af6f01b892a2e3abc183f3c3f841b96f2104b9bb393bc2359a3bceee72", 0xed, 0xfff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) (async) read$ptp(0xffffffffffffffff, &(0x7f0000000400)=""/120, 0x78) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x3, &(0x7f00000006c0)=[{0x0, 0x0, 0x7fffffffffffffff}, {&(0x7f0000000480), 0x0, 0xfffffffffffffffc}, {&(0x7f00000005c0)="f840db20ae9e6ecc2c2beb0a1a5ed59c919ee73b36166a6a53f30f5922e5544bbe1183b842c95c9c0a3d12cb1d2083fa876db0deb4c1c734962d20703ed935a7e7817c851743e95f694c6d490d0a66904c506ca6705c7d047b99c18b08b55d26b5df26da29b5c123b9606b8dd4d77662c9063fd7aa590f1c617c021ed61c8d489aa687868d0bdc70a46eed9ff7a48853ea58d39da5c68f7cd95743c497876980476660fbea53bb2aad87b6dab57e72757b59fbb84b149ff7157a49c1682490ddf535ef51d7155122d36d101a798a6141af6f01b892a2e3abc183f3c3f841b96f2104b9bb393bc2359a3bceee72", 0xed, 0xfff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async, rerun: 64) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async, rerun: 64) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) (async) read$ptp(0xffffffffffffffff, &(0x7f0000000400)=""/120, 0x78) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async, rerun: 64) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async, rerun: 32) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async, rerun: 32) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) (rerun: 32) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="4100007395564e890001000000f0a977af0e08fe291a000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async, rerun: 32) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) (rerun: 32) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async, rerun: 64) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async, rerun: 64) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="4100007395564e890001000000f0a977af0e08fe291a000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) (async, rerun: 64) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async, rerun: 64) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="4100007395564e890001000000f0a977af0e08fe291a000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000440)=ANY=[@ANYRESOCT]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f0000000340)='.\x00', &(0x7f0000000400)={{0x0, 0x2710}}) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000400)={0x28, 0x0, 0x0, @host}, 0x10) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000440)=ANY=[@ANYRESOCT]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f0000000340)='.\x00', &(0x7f0000000400)={{0x0, 0x2710}}) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000400)={0x28, 0x0, 0x0, @host}, 0x10) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async, rerun: 32) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async, rerun: 32) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) (rerun: 32) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000440)=ANY=[@ANYRESOCT]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f0000000340)='.\x00', &(0x7f0000000400)={{0x0, 0x2710}}) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000400)={0x28, 0x0, 0x0, @host}, 0x10) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000440)=ANY=[@ANYRESOCT]) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) (async) syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f0000000340)='.\x00', &(0x7f0000000400)={{0x0, 0x2710}}) (async) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000400)={0x28, 0x0, 0x0, @host}, 0x10) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) (async) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000400), 0x400600, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) openat$md(0xffffffffffffff9c, &(0x7f0000000400), 0x400600, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async, rerun: 32) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async, rerun: 64) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) (rerun: 64) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) openat$md(0xffffffffffffff9c, &(0x7f0000000400), 0x400600, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async, rerun: 64) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) (rerun: 64) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='don4_hash,\x00']) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='don4_hash,\x00']) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='don4_hash,\x00']) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) (async) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) (async) syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) (async) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='don4_hash,\x00']) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) (async) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) (async) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x6402, 0x4a) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000000c0)) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f0000000400)={0x9, 0x3de9, 0x1}) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x6402, 0x4a) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000000c0)) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f0000000400)={0x9, 0x3de9, 0x1}) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) (async) openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x6402, 0x4a) (async) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000000c0)) (async) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f0000000400)={0x9, 0x3de9, 0x1}) (async) syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) (async) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x6402, 0x4a) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000000c0)) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f0000000400)={0x9, 0x3de9, 0x1}) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) (async) openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x6402, 0x4a) (async) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000000c0)) (async) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f0000000400)={0x9, 0x3de9, 0x1}) (async) syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) (async) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$PTP_PIN_SETFUNC(r4, 0x40603d07, &(0x7f0000000400)={'\x00', 0x5, 0x1, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async, rerun: 64) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) (rerun: 64) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async, rerun: 32) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async, rerun: 32) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async, rerun: 32) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (rerun: 32) ioctl$PTP_PIN_SETFUNC(r4, 0x40603d07, &(0x7f0000000400)={'\x00', 0x5, 0x1, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async, rerun: 64) ioctl$PTP_PIN_SETFUNC(r4, 0x40603d07, &(0x7f0000000400)={'\x00', 0x5, 0x1, 0x3ff}) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) epoll_wait(r4, &(0x7f0000000400)=[{}, {}, {}, {}], 0x4, 0x197) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303036303030302c757365725f69643dfbf51adbf53e16e8d60100b81425c57e93646e085b0ed1db39a640ce283160e5954e9336f1b5eac1e46d3153c3f5d9931b5bc6d626af685ce00acfd6ef8ae7d010a0cec28bcb9cc1ddbfb3ffa4699d41a6926fba58ddf9e95656af4c0b9e48101bb998c31b295da9709d8ab47ff2888a958aff480cb89afbda210b021e05724a467e0374333ee0271f7b457d29924560852964", @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) epoll_wait(r4, &(0x7f0000000400)=[{}, {}, {}, {}], 0x4, 0x197) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303036303030302c757365725f69643dfbf51adbf53e16e8d60100b81425c57e93646e085b0ed1db39a640ce283160e5954e9336f1b5eac1e46d3153c3f5d9931b5bc6d626af685ce00acfd6ef8ae7d010a0cec28bcb9cc1ddbfb3ffa4699d41a6926fba58ddf9e95656af4c0b9e48101bb998c31b295da9709d8ab47ff2888a958aff480cb89afbda210b021e05724a467e0374333ee0271f7b457d29924560852964", @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async, rerun: 64) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async, rerun: 32) epoll_wait(r4, &(0x7f0000000400)=[{}, {}, {}, {}], 0x4, 0x197) (async, rerun: 32) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303036303030302c757365725f69643dfbf51adbf53e16e8d60100b81425c57e93646e085b0ed1db39a640ce283160e5954e9336f1b5eac1e46d3153c3f5d9931b5bc6d626af685ce00acfd6ef8ae7d010a0cec28bcb9cc1ddbfb3ffa4699d41a6926fba58ddf9e95656af4c0b9e48101bb998c31b295da9709d8ab47ff2888a958aff480cb89afbda210b021e05724a467e0374333ee0271f7b457d29924560852964", @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400), 0x3, 0x18000) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000440)) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) r3 = syz_open_dev$loop(&(0x7f0000000400), 0x3, 0x18000) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000440)) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) r3 = syz_open_dev$loop(&(0x7f0000000400), 0x3, 0x18000) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000440)) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) syz_mount_image$fuse(&(0x7f00000004c0), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000600)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}], [{@euid_lt}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@context={'context', 0x3d, 'user_u'}}]}}) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, r2, {0x1, 0x1}}, './file0\x00'}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000440)={@desc={0x1, 0x0, @desc2}, 0x10, 0x0, '\x00', @d}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async, rerun: 32) set_mempolicy(0x2, 0x0, 0x400000020000002) (async, rerun: 32) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) syz_mount_image$fuse(&(0x7f00000004c0), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000600)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}], [{@euid_lt}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@context={'context', 0x3d, 'user_u'}}]}}) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async, rerun: 64) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (rerun: 64) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, r2, {0x1, 0x1}}, './file0\x00'}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000440)={@desc={0x1, 0x0, @desc2}, 0x10, 0x0, '\x00', @d}) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async, rerun: 64) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) (async, rerun: 32) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async, rerun: 32) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) syz_mount_image$fuse(&(0x7f00000004c0), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000600)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}], [{@euid_lt}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@context={'context', 0x3d, 'user_u'}}]}}) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, r2, {0x1, 0x1}}, './file0\x00'}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000440)={@desc={0x1, 0x0, @desc2}, 0x10, 0x0, '\x00', @d}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x446040, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1000) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x9}, {0xfffffffffffffffc, 0x6}, 0x3, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) r6 = syz_mount_image$jffs2(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x13d, 0x5, &(0x7f00000017c0)=[{&(0x7f00000005c0)="75303faeecbba5f400a4c8158baceec3b617c6c5bd5dce6bd88ce4dbc0a82fbc72d91ac069f47c2834cc89e8edb7fab31a6cf9eff6c12ddc9d6e1706b614c147d93f2b57613cc70e09dd52b135fa00338d67264e331a428504a99824592ffdee3f6412f0972b9e0b66514ca6434295afe11fb8152830fc21192cd1c0b2e5023ed31741bec7d18a12f7ba111bd353e51b5600ef255a94afa73ff680ceac9835d1b8cbaefa0586", 0xa6, 0x7}, {&(0x7f0000000680)="68ae759beb237015989c8ca64b61dd881108baea24fbde0ff7b61c1cdabf5534357ab2ffba8d56d04b26228e2b0e751c82bcf51e2c9463031cb47ddb2c0ff262b6d3477378f6d9706c5931341f", 0x4d, 0x6}, {&(0x7f0000000700)="35e8d8e355f2f5fff95e70ec4bb31f4fcdd2be9add783537c79a29564f7a5f3a44453a6df887bad0350199bf31d9d2cc62234f0d50bb52364a98291fe5aa3c7d725ae9a815ef4b75d06030639fb147a11a1ece72d2d790bed871b060a39126d5de5212575beb3d0c391b4c334f9e2be0f29ace7b4377e5cc4e388868ddf18d00219e013f8bb81dfc5a9750205ab65dfc64", 0x91, 0x5}, {&(0x7f00000007c0)="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", 0x1000, 0x2}, {&(0x7f00000004c0)="9d672fb5b32c9b8614004db10cd8512b80abaec83c9df935855dd676c4", 0x1d, 0x1}], 0x4, &(0x7f0000001840)={[{@compr_lzo}, {@rp_size={'rp_size', 0x3d, 0x8001}}], [{@permit_directio}, {@obj_type={'obj_type', 0x3d, '+.'}}, {@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@hash}, {@dont_appraise}, {@euid_gt={'euid>', r3}}, {@dont_hash}]}) openat$incfs(r6, &(0x7f0000001900)='.pending_reads\x00', 0x80180, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010400000100000018000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x446040, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1000) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x9}, {0xfffffffffffffffc, 0x6}, 0x3, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) r6 = syz_mount_image$jffs2(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x13d, 0x5, &(0x7f00000017c0)=[{&(0x7f00000005c0)="75303faeecbba5f400a4c8158baceec3b617c6c5bd5dce6bd88ce4dbc0a82fbc72d91ac069f47c2834cc89e8edb7fab31a6cf9eff6c12ddc9d6e1706b614c147d93f2b57613cc70e09dd52b135fa00338d67264e331a428504a99824592ffdee3f6412f0972b9e0b66514ca6434295afe11fb8152830fc21192cd1c0b2e5023ed31741bec7d18a12f7ba111bd353e51b5600ef255a94afa73ff680ceac9835d1b8cbaefa0586", 0xa6, 0x7}, {&(0x7f0000000680)="68ae759beb237015989c8ca64b61dd881108baea24fbde0ff7b61c1cdabf5534357ab2ffba8d56d04b26228e2b0e751c82bcf51e2c9463031cb47ddb2c0ff262b6d3477378f6d9706c5931341f", 0x4d, 0x6}, {&(0x7f0000000700)="35e8d8e355f2f5fff95e70ec4bb31f4fcdd2be9add783537c79a29564f7a5f3a44453a6df887bad0350199bf31d9d2cc62234f0d50bb52364a98291fe5aa3c7d725ae9a815ef4b75d06030639fb147a11a1ece72d2d790bed871b060a39126d5de5212575beb3d0c391b4c334f9e2be0f29ace7b4377e5cc4e388868ddf18d00219e013f8bb81dfc5a9750205ab65dfc64", 0x91, 0x5}, {&(0x7f00000007c0)="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", 0x1000, 0x2}, {&(0x7f00000004c0)="9d672fb5b32c9b8614004db10cd8512b80abaec83c9df935855dd676c4", 0x1d, 0x1}], 0x4, &(0x7f0000001840)={[{@compr_lzo}, {@rp_size={'rp_size', 0x3d, 0x8001}}], [{@permit_directio}, {@obj_type={'obj_type', 0x3d, '+.'}}, {@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@hash}, {@dont_appraise}, {@euid_gt={'euid>', r3}}, {@dont_hash}]}) openat$incfs(r6, &(0x7f0000001900)='.pending_reads\x00', 0x80180, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010400000100000018000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x446040, 0x0) (async) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1000) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) (async) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) (async) syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x9}, {0xfffffffffffffffc, 0x6}, 0x3, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) (async) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) (async) syz_mount_image$jffs2(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x13d, 0x5, &(0x7f00000017c0)=[{&(0x7f00000005c0)="75303faeecbba5f400a4c8158baceec3b617c6c5bd5dce6bd88ce4dbc0a82fbc72d91ac069f47c2834cc89e8edb7fab31a6cf9eff6c12ddc9d6e1706b614c147d93f2b57613cc70e09dd52b135fa00338d67264e331a428504a99824592ffdee3f6412f0972b9e0b66514ca6434295afe11fb8152830fc21192cd1c0b2e5023ed31741bec7d18a12f7ba111bd353e51b5600ef255a94afa73ff680ceac9835d1b8cbaefa0586", 0xa6, 0x7}, {&(0x7f0000000680)="68ae759beb237015989c8ca64b61dd881108baea24fbde0ff7b61c1cdabf5534357ab2ffba8d56d04b26228e2b0e751c82bcf51e2c9463031cb47ddb2c0ff262b6d3477378f6d9706c5931341f", 0x4d, 0x6}, {&(0x7f0000000700)="35e8d8e355f2f5fff95e70ec4bb31f4fcdd2be9add783537c79a29564f7a5f3a44453a6df887bad0350199bf31d9d2cc62234f0d50bb52364a98291fe5aa3c7d725ae9a815ef4b75d06030639fb147a11a1ece72d2d790bed871b060a39126d5de5212575beb3d0c391b4c334f9e2be0f29ace7b4377e5cc4e388868ddf18d00219e013f8bb81dfc5a9750205ab65dfc64", 0x91, 0x5}, {&(0x7f00000007c0)="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", 0x1000, 0x2}, {&(0x7f00000004c0)="9d672fb5b32c9b8614004db10cd8512b80abaec83c9df935855dd676c4", 0x1d, 0x1}], 0x4, &(0x7f0000001840)={[{@compr_lzo}, {@rp_size={'rp_size', 0x3d, 0x8001}}], [{@permit_directio}, {@obj_type={'obj_type', 0x3d, '+.'}}, {@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@hash}, {@dont_appraise}, {@euid_gt={'euid>', r3}}, {@dont_hash}]}) (async) openat$incfs(r6, &(0x7f0000001900)='.pending_reads\x00', 0x80180, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010400000100000018000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) (async) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x446040, 0x0) (async) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1000) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) (async) set_mempolicy(0x2, 0x0, 0x400000020000002) (async) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) (async) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x9}, {0xfffffffffffffffc, 0x6}, 0x3, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) r6 = syz_mount_image$jffs2(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x13d, 0x5, &(0x7f00000017c0)=[{&(0x7f00000005c0)="75303faeecbba5f400a4c8158baceec3b617c6c5bd5dce6bd88ce4dbc0a82fbc72d91ac069f47c2834cc89e8edb7fab31a6cf9eff6c12ddc9d6e1706b614c147d93f2b57613cc70e09dd52b135fa00338d67264e331a428504a99824592ffdee3f6412f0972b9e0b66514ca6434295afe11fb8152830fc21192cd1c0b2e5023ed31741bec7d18a12f7ba111bd353e51b5600ef255a94afa73ff680ceac9835d1b8cbaefa0586", 0xa6, 0x7}, {&(0x7f0000000680)="68ae759beb237015989c8ca64b61dd881108baea24fbde0ff7b61c1cdabf5534357ab2ffba8d56d04b26228e2b0e751c82bcf51e2c9463031cb47ddb2c0ff262b6d3477378f6d9706c5931341f", 0x4d, 0x6}, {&(0x7f0000000700)="35e8d8e355f2f5fff95e70ec4bb31f4fcdd2be9add783537c79a29564f7a5f3a44453a6df887bad0350199bf31d9d2cc62234f0d50bb52364a98291fe5aa3c7d725ae9a815ef4b75d06030639fb147a11a1ece72d2d790bed871b060a39126d5de5212575beb3d0c391b4c334f9e2be0f29ace7b4377e5cc4e388868ddf18d00219e013f8bb81dfc5a9750205ab65dfc64", 0x91, 0x5}, {&(0x7f00000007c0)="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", 0x1000, 0x2}, {&(0x7f00000004c0)="9d672fb5b32c9b8614004db10cd8512b80abaec83c9df935855dd676c4", 0x1d, 0x1}], 0x4, &(0x7f0000001840)={[{@compr_lzo}, {@rp_size={'rp_size', 0x3d, 0x8001}}], [{@permit_directio}, {@obj_type={'obj_type', 0x3d, '+.'}}, {@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@hash}, {@dont_appraise}, {@euid_gt={'euid>', r3}}, {@dont_hash}]}) openat$incfs(r6, &(0x7f0000001900)='.pending_reads\x00', 0x80180, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010400000100000018000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$PTP_PIN_SETFUNC(r4, 0x40603d07, &(0x7f0000000400)={'\x00', 0x5, 0x1, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="4100007395564e890001000000f0a977af0e08fe291a000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="4100007395564e890001000000f0a977af0e08fe291a000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) [ 1082.358580] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1082.431538] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="4100007395564e890001000000f0a977af0e08fe291a000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) [ 1082.589443] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="4100007395564e890001000000f0a977af0e08fe291a000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="4100007395564e890001000000f0a977af0e08fe291a000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="4100007395564e890001000000f0a977af0e08fe291a000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="4100007395564e890001000000f0a977af0e08fe291a000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) 18:35:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000380)) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000380)) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:18 executing program 0: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:18 executing program 0: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:18 executing program 0: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) 18:35:18 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) 18:35:32 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:32 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) 18:35:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) 18:35:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="646f6e7451c4b763d39e1e45a4eb28f2b35fbd4e4a021f4ec922b1e1eb"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0xffffffffffffffff, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000480)=[{}], 0x1, 0x7f, &(0x7f0000000340)={[0x5]}, 0x65) 18:35:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f0000000400)='./file0\x00', 0x0, 0x7ff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x204000, 0x80) r7 = openat$incfs(r6, &(0x7f0000000040)='.log\x00', 0x6402, 0x4a) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r7, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000006c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@blksize={'blksize', 0x3d, 0x3a00}}], [{@pcr={'pcr', 0x3d, 0x1e}}, {@dont_appraise}, {@seclabel}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) 18:35:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xb65b95578a9b4a4b, &(0x7f00000005c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@pcr={'pcr', 0x3d, 0x10001e}}]}}) 18:35:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) 18:35:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, 'fdW7\x01\xa0\x05H\xccT\xde\x11\xf3\"\x9dL+\xed\b\xe5c=\xa1\x8e\xdb\xcdh\xc1\xdc\x8a\x88o\xd1\x81\xbd \b*:\xe2\xbf\xc8weD8\xa1\xaf\xb4V\xfdW\x8b[\x98\xf2Y\x13\xe1\xb5\x94V\xa7\xbf7\xf9\x85\xa3\x01\xfa\xe4\xae6.r\xa1D\xe6<\xb5+\xed\xc1\x1b\xa0\xc5\x81\xb5Q|7c\xc4'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000005c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c65310013c41c30ebe8e00006c165a731fd8cbc4b8310a7b63efdae26397c5304dfd92f4dace066cee053ad6c3a69c4d815f90ebbff1623992393124c31d791fcf1947db477376a416736c30bc52c2349bbc3441a9fae977fd813a1f33bba50b7fca6dee11f8cfa7195eb8338449c16aa17b05fb8e41cfcdc75c1c93e6211d8ca90021c56cb4ecb69234598ea24895a0bfcdc87e41de00bce10a502532b35bc8f01a97dc187d0d52fb8f4ae8c0ae105251de06030d72b67c383cc"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="645c6e745f686173760100"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) fchownat(r3, &(0x7f00000005c0)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x400) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0xf}, 0x5, [0x2, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10002, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0000000000e0ff000900"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) 18:35:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="645c6e745f686173760100"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) fchownat(r3, &(0x7f00000005c0)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x400) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0xf}, 0x5, [0x2, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10002, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0000000000e0ff000900"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) 18:35:33 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="645c6e745f686173760100"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) fchownat(r3, &(0x7f00000005c0)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x400) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0xf}, 0x5, [0x2, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10002, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0000000000e0ff000900"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="645c6e745f686173760100"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) fchownat(r3, &(0x7f00000005c0)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x400) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0xf}, 0x5, [0x2, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10002, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0000000000e0ff000900"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) futimesat(r4, &(0x7f0000000400)='\x00', &(0x7f0000000480)={{}, {r6, r7/1000+60000}}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r3, @ANYBLOB="2c6772633d3f0f399c6f", @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, 'fdW7\x01\xa0\x05H\xccT\xde\x11\xf3\"\x9dL+\xed\b\xe5c=\xa1\x8e\xdb\xcdh\xc1\xdc\x8a\x88o\xd1\x81\xbd \b*:\xe2\xbf\xc8weD8\xa1\xaf\xb4V\xfdW\x8b[\x98\xf2Y\x13\xe1\xb5\x94V\xa7\xbf7\xf9\x85\xa3\x01\xfa\xe4\xae6.r\xa1D\xe6<\xb5+\xed\xc1\x1b\xa0\xc5\x81\xb5Q|7c\xc4'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000005c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c65310013c41c30ebe8e00006c165a731fd8cbc4b8310a7b63efdae26397c5304dfd92f4dace066cee053ad6c3a69c4d815f90ebbff1623992393124c31d791fcf1947db477376a416736c30bc52c2349bbc3441a9fae977fd813a1f33bba50b7fca6dee11f8cfa7195eb8338449c16aa17b05fb8e41cfcdc75c1c93e6211d8ca90021c56cb4ecb69234598ea24895a0bfcdc87e41de00bce10a502532b35bc8f01a97dc187d0d52fb8f4ae8c0ae105251de06030d72b67c383cc"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) 18:35:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) 18:35:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) r2 = getegid() setregid(0xffffffffffffffff, r2) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="645c6e745f686173760100"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) fchownat(r3, &(0x7f00000005c0)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x400) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0xf}, 0x5, [0x2, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10002, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0000000000e0ff000900"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, 'fdW7\x01\xa0\x05H\xccT\xde\x11\xf3\"\x9dL+\xed\b\xe5c=\xa1\x8e\xdb\xcdh\xc1\xdc\x8a\x88o\xd1\x81\xbd \b*:\xe2\xbf\xc8weD8\xa1\xaf\xb4V\xfdW\x8b[\x98\xf2Y\x13\xe1\xb5\x94V\xa7\xbf7\xf9\x85\xa3\x01\xfa\xe4\xae6.r\xa1D\xe6<\xb5+\xed\xc1\x1b\xa0\xc5\x81\xb5Q|7c\xc4'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000005c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c65310013c41c30ebe8e00006c165a731fd8cbc4b8310a7b63efdae26397c5304dfd92f4dace066cee053ad6c3a69c4d815f90ebbff1623992393124c31d791fcf1947db477376a416736c30bc52c2349bbc3441a9fae977fd813a1f33bba50b7fca6dee11f8cfa7195eb8338449c16aa17b05fb8e41cfcdc75c1c93e6211d8ca90021c56cb4ecb69234598ea24895a0bfcdc87e41de00bce10a502532b35bc8f01a97dc187d0d52fb8f4ae8c0ae105251de06030d72b67c383cc"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74696f64653d30303030303030303030303030303030303132303030e986e972dcd57a8596664fe76c50f11b0362b9776799", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74696f64653d30303030303030303030303030303030303132303030e986e972dcd57a8596664fe76c50f11b0362b9776799", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) r2 = getegid() setregid(0xffffffffffffffff, r2) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:33 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000380)) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) 18:35:33 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000380)) 18:35:33 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74696f64653d30303030303030303030303030303030303132303030e986e972dcd57a8596664fe76c50f11b0362b9776799", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:33 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:33 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000380)) 18:35:33 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:33 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="646f6e745f686173682c004003f2fa68812070a441"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000340)='\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.log\x00', 0x80000, 0x8) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="646f6e745f68617368a701"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',roo0000000000000060000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) r2 = getegid() setregid(0xffffffffffffffff, r2) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r5) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000440)={[{}, {@compr_zlib}, {@compr_zlib}, {@compr_lzo}, {@compr_lzo}, {}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000380)) utimensat(r3, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)={{0x77359400}, {0x77359400}}, 0x100) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100f79af803a659863ed800000100000018000000ed5d86e4f853bf4cd9ec2218d8a25df8034615ac5f8f4d3acec4d87166f11dfbb61dbe7507c4c38605a6626c52", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r5) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:33 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="1e726f6f746d6f64653d30303030303030303030303030303030303132303030302c75735a725f69643de28f5611699f6a7b774b2d796ffa37cbdaa068ab3845c73ca6abe33c8fcd337ef83db1a3a239555f72a1ff965e5775a4f0979670814cadd60e71653cf0e5b468e3cb5cb8b38ee020d48f020b662b7b611abbee6ed0cf8decc4487627d790c8f8bf395e6a6977b4a88e2331ac3f2d84d1eba07083558155afba2ee4761c092bb5625a22db24", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="e8535057368bf37cb44b850e9104000000000000002e2f66696c8631005f3104cf94c330cfe784e904b129f1af86d3b1a77a8379131e2aa7b851425a001b8c19e3664452f494b2ed594bff9689ef57e9dadbded89d79649622eb325a1c0124ba903f3314f0f4791ff6f8c8ab1170ec52d814972c8c34a7c7ca5511f040d53caec8e292295b7c7798e24476d12700624e543965609e74bc64062c5f58110fc5e3"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)=ANY=[@ANYBLOB="721b2866a331643d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:33 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) [ 1098.166155] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:33 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:33 executing program 3: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:33 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:33 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="1e726f6f746d6f64653d30303030303030303030303030303030303132303030302c75735a725f69643de28f5611699f6a7b774b2d796ffa37cbdaa068ab3845c73ca6abe33c8fcd337ef83db1a3a239555f72a1ff965e5775a4f0979670814cadd60e71653cf0e5b468e3cb5cb8b38ee020d48f020b662b7b611abbee6ed0cf8decc4487627d790c8f8bf395e6a6977b4a88e2331ac3f2d84d1eba07083558155afba2ee4761c092bb5625a22db24", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="e8535057368bf37cb44b850e9104000000000000002e2f66696c8631005f3104cf94c330cfe784e904b129f1af86d3b1a77a8379131e2aa7b851425a001b8c19e3664452f494b2ed594bff9689ef57e9dadbded89d79649622eb325a1c0124ba903f3314f0f4791ff6f8c8ab1170ec52d814972c8c34a7c7ca5511f040d53caec8e292295b7c7798e24476d12700624e543965609e74bc64062c5f58110fc5e3"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)=ANY=[@ANYBLOB="721b2866a331643d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:33 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:33 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r5) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303630303001a9ae3807022cc8c465725f69643d4cd1c89670ca97330d2a15c9cbd231276ed6f1697828f672ca6dc90bcd99a30e48c36e12ef4eed168cbd99a8f5df32b9ff5570dcf21f0ce69803d018e075bf82628c75ff694780636f8179cca96e24", @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:34 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:34 executing program 0: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0xfc1c0e16db656748}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '('}}, {@obj_role={'obj_role', 0x3d, '/dev/input/mouse#\x00'}}]}}) 18:35:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r5) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303630303001a9ae3807022cc8c465725f69643d4cd1c89670ca97330d2a15c9cbd231276ed6f1697828f672ca6dc90bcd99a30e48c36e12ef4eed168cbd99a8f5df32b9ff5570dcf21f0ce69803d018e075bf82628c75ff694780636f8179cca96e24", @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:34 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:34 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="1e726f6f746d6f64653d30303030303030303030303030303030303132303030302c75735a725f69643de28f5611699f6a7b774b2d796ffa37cbdaa068ab3845c73ca6abe33c8fcd337ef83db1a3a239555f72a1ff965e5775a4f0979670814cadd60e71653cf0e5b468e3cb5cb8b38ee020d48f020b662b7b611abbee6ed0cf8decc4487627d790c8f8bf395e6a6977b4a88e2331ac3f2d84d1eba07083558155afba2ee4761c092bb5625a22db24", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="e8535057368bf37cb44b850e9104000000000000002e2f66696c8631005f3104cf94c330cfe784e904b129f1af86d3b1a77a8379131e2aa7b851425a001b8c19e3664452f494b2ed594bff9689ef57e9dadbded89d79649622eb325a1c0124ba903f3314f0f4791ff6f8c8ab1170ec52d814972c8c34a7c7ca5511f040d53caec8e292295b7c7798e24476d12700624e543965609e74bc64062c5f58110fc5e3"]) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)=ANY=[@ANYBLOB="721b2866a331643d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:34 executing program 0: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:34 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:34 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:34 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:34 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x25146e23c2e6f220) 18:35:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:34 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) 18:35:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r5) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303630303001a9ae3807022cc8c465725f69643d4cd1c89670ca97330d2a15c9cbd231276ed6f1697828f672ca6dc90bcd99a30e48c36e12ef4eed168cbd99a8f5df32b9ff5570dcf21f0ce69803d018e075bf82628c75ff694780636f8179cca96e24", @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="646f6e744b3f770e30047e"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)={0xe000200f}) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000040000000001=', @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c736d61636b66737472616e736d0074653d232d5d7d2c3a3a2c646566636f6e746578743d7573590f65725f752c686173682c00"]) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="646f6e745f68618a1bac9f"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) utimensat(r2, &(0x7f0000000400)='./file1\x00', &(0x7f0000000440)={{}, {0x77359400}}, 0x100) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xa) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="0100532484f74d3e7c7f5b00", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000480)={0x9, 0x6}) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@allow_other}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:34 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) 18:35:34 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x90, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0xfc1c0e16db656748}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '('}}, {@obj_role={'obj_role', 0x3d, '/dev/input/mouse#\x00'}}]}}) 18:35:34 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) 18:35:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r5) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303630303001a9ae3807022cc8c465725f69643d4cd1c89670ca97330d2a15c9cbd231276ed6f1697828f672ca6dc90bcd99a30e48c36e12ef4eed168cbd99a8f5df32b9ff5570dcf21f0ce69803d018e075bf82628c75ff694780636f8179cca96e24", @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000a00,default_permissions,pcr=00000000000000000030,\x00']) 18:35:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="646f6e745f68618a1bac9f"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) utimensat(r2, &(0x7f0000000400)='./file1\x00', &(0x7f0000000440)={{}, {0x77359400}}, 0x100) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xa) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="0100532484f74d3e7c7f5b00", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000480)={0x9, 0x6}) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@allow_other}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) getresuid(&(0x7f00000003c0)=0x0, &(0x7f0000000440), &(0x7f0000000480)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1030005, &(0x7f00000005c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0xa4c}}], [{@smackfsroot}, {@dont_measure}, {@smackfsroot}, {@euid_gt}, {@context={'context', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, ',*\'-8:\''}}, {@uid_eq}, {@fowner_gt={'fowner>', r5}}, {@context={'context', 0x3d, 'system_u'}}]}}) 18:35:34 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="a8ff42a31314cc33c79ef2f305a4359806797c14f3188be57bd4e742c79b3359b786003c28e5646b6f861e22df1c0ce969db60cacc81d2d8b94f2e1fc202789c838a3b9e28a35f090a311447b77fd6dc1b8c29fbd883d12e94722a0ec753d46cebffdb2083b675c8de8935f11c28558a9de63977d58f5a72"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440), 0x98480, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00'/16]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_open_dev$mouse(&(0x7f0000000400), 0xffffffffffff73fa, 0x52d442) semget(0x3, 0x0, 0x80) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 18:35:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:34 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x90, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0xfc1c0e16db656748}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '('}}, {@obj_role={'obj_role', 0x3d, '/dev/input/mouse#\x00'}}]}}) 18:35:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:34 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="646f6e745f686173682c00d5622feaba60b860ab9593d42bc57f38fc3b2f167e3b9d3183628ba8cfc17bf7a73209968e88bb2b0ec772e7ffa80be240a733a45b9547cf1e3d2e10eb49d53312c70db9746dccd6768a7fd912b39de70d02d744bb5a488e92487cd855f313117ba3b4b3d4002d07d113ef2c4ddb096fb5d03e1cc8a04baf33a49fb33c2620db38665a07048c96"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:34 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000380)) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x90, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0xfc1c0e16db656748}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '('}}, {@obj_role={'obj_role', 0x3d, '/dev/input/mouse#\x00'}}]}}) 18:35:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 18:35:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) getresuid(&(0x7f00000003c0)=0x0, &(0x7f0000000440), &(0x7f0000000480)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1030005, &(0x7f00000005c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0xa4c}}], [{@smackfsroot}, {@dont_measure}, {@smackfsroot}, {@euid_gt}, {@context={'context', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, ',*\'-8:\''}}, {@uid_eq}, {@fowner_gt={'fowner>', r5}}, {@context={'context', 0x3d, 'system_u'}}]}}) 18:35:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:34 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x0, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x0, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 18:35:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 18:35:34 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 18:35:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 18:35:34 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x0, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x0, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 18:35:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x0, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x0, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 18:35:35 executing program 3: syz_mount_image$fuse(&(0x7f0000000280), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 18:35:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:35 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 18:35:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x0, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x0, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 18:35:35 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 18:35:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x0, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x0, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 18:35:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x2a8430, &(0x7f0000000440)={[{}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) r4 = openat$incfs(r1, &(0x7f00000000c0)='.pending_reads\x00', 0x100002, 0xc8) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000003c0)={0x3, 0xe381}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x1}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, r5, {0x4}}, './file1\x00'}) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r6) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) [ 1099.629942] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:35 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x0, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x0, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 18:35:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 18:35:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x2a8430, &(0x7f0000000440)={[{}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) r4 = openat$incfs(r1, &(0x7f00000000c0)='.pending_reads\x00', 0x100002, 0xc8) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000003c0)={0x3, 0xe381}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x1}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, r5, {0x4}}, './file1\x00'}) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r6) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:35 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x2a8430, &(0x7f0000000440)={[{}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) r4 = openat$incfs(r1, &(0x7f00000000c0)='.pending_reads\x00', 0x100002, 0xc8) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000003c0)={0x3, 0xe381}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x1}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, r5, {0x4}}, './file1\x00'}) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r6) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x400000020000002) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r9) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:35 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:35 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#-]},::'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}]}}) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[], [{@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(r4, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x0, 0x6, 0x0, 0x10001, 0x101, 0x0, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 18:35:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:36 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 1100.337230] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:36 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) futimesat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}}) 18:35:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:36 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) 18:35:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) 18:35:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:36 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:36 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) 18:35:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {0x3ff}, {0x0, 0x6}, 0x5, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x10001, 0x101, 0x3, 0x4, 0x7, 0xd3, 0x100000000, 0x7fffffffffffffff, 0x5]}) [ 1100.578220] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) 18:35:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:36 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:36 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 18:35:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) 18:35:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:36 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) 18:35:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) 18:35:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:35:36 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 18:35:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) 18:35:36 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) 18:35:36 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x7, 0x400200) 18:35:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) 18:35:36 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) 18:35:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 18:35:36 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 18:35:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x10, &(0x7f0000000100)) 18:35:37 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 18:35:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) 18:35:37 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 18:35:37 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:37 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 18:35:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:37 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) r4 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000380)) 18:35:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:37 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:37 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:37 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:37 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4b6f9df2196d6fa41491ca0dc7d62e1b7e745f686173682c00"]) 18:35:37 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) 18:35:37 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:37 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) 18:35:37 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) 18:35:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:37 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:37 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:37 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) set_mempolicy(0x2, 0x0, 0x0) 18:35:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:37 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:37 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) 18:35:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:38 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000380)) r3 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r2, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000500)='./file0\x00', 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 18:35:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:38 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000380)) r1 = syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) linkat(r0, &(0x7f00000002c0)='./file0\x00', r1, &(0x7f0000000500)='./file0\x00', 0x1400) 18:35:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) 18:35:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) 18:35:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) 18:35:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:38 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000380)) syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 18:35:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) 18:35:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:38 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="64ff41409d00299576f9a71bf7b238891d5efe0f6da524eb8545ff87ac1a5eef318005109fec2d4be7b5dcb28f55007d626464"]) syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 18:35:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:38 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) 18:35:38 executing program 3: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 18:35:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:38 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:38 executing program 3: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 18:35:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:38 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:38 executing program 3: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 18:35:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 18:35:38 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 18:35:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 18:35:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:38 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 18:35:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:38 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 18:35:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:38 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:38 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 18:35:38 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:38 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 18:35:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:38 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 18:35:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=']) 18:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01]) 18:35:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030"]) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 18:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 18:35:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 18:35:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 1: syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:39 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 18:35:39 executing program 1: syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 1: syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d"]) 18:35:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 18:35:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f"]) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:40 executing program 3: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 3: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 3: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB='3']) 18:35:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 18:35:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 5: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 18:35:40 executing program 5: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 5: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:40 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 2: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 2: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:40 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB='3']) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 2: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB='3']) 18:35:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:40 executing program 3: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 18:35:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB='3']) 18:35:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:41 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYBLOB='3']) 18:35:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:41 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:41 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYBLOB='3']) 18:35:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:41 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYBLOB='3']) 18:35:41 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:41 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:41 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB='3']) 18:35:41 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:41 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 18:35:41 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB='3']) 18:35:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:41 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB='3']) 18:35:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:41 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:41 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB='3']) 18:35:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 18:35:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:41 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB='3']) 18:35:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:41 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:41 executing program 3: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 18:35:41 executing program 3: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 18:35:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:41 executing program 3: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 18:35:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:41 executing program 0: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB='3']) 18:35:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 18:35:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 18:35:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 18:35:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 18:35:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:41 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 18:35:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 18:35:41 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:41 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 18:35:41 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 18:35:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:41 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 18:35:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 18:35:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:42 executing program 4: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:42 executing program 4: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:42 executing program 4: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:43 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) 18:35:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) 18:35:43 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:43 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) [ 1107.506390] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:43 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:43 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:43 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:43 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:43 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 1107.820770] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:43 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) [ 1107.941139] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:43 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:43 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:44 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:44 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:44 executing program 1: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="33bf5198a5d9818d33b65f2c726f6f746d6f64653d303030308e85df80280300c5303030303030303030", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfstransmute=#-]},::,defcontext=user_u,hash,\x00']) 18:35:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:44 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:44 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 1109.322810] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:45 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 1109.641911] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:45 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) [ 1109.742722] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:45 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:45 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) [ 1110.188694] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:46 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:46 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:46 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:46 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:46 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:35:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:47 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 1111.386181] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:47 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) 18:35:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) 18:35:47 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:47 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:47 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:47 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:47 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:48 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:48 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:48 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:48 executing program 3: r0 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:48 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:48 executing program 3: r0 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) 18:35:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) [ 1113.176121] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:48 executing program 3: r0 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) [ 1113.274105] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 18:35:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 18:35:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 18:35:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) 18:35:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) 18:35:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) 18:35:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:35:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) 18:35:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:35:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:35:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:35:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 1115.015463] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) [ 1115.170208] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 1115.281385] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) 18:35:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) 18:35:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) 18:35:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 1116.424868] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 1: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 1: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:52 executing program 1: r0 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) linkat(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x10, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 18:35:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) 18:35:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) [ 1117.637748] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) 18:35:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) [ 1118.107436] MTD: Attempt to mount non-MTD device "/dev/loop0" 18:35:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x0, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x0, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x0, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) 18:35:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 18:35:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) 18:35:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x1e}}]}}) 18:35:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x0, 0x0, 0x400000020000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 18:35:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) r1 = syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, &(0x7f0000000340)) r2 = ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) linkat(r1, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) set_mempolicy(0x2, 0x0, 0x400000020000002) syz_mount_image$jffs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x7fffffffffffffff}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000380)) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x400200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c6c8e1633d365b2d778d0d516b9a2ecd", 0x0, 0x0, {}, {0x0, 0x6}, 0x0, [0x9, 0x3, 0x3, 0x8d9, 0x2, 0x6, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd3]}) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000400)={{0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 1119.549639] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1119.632610] kasan: CONFIG_KASAN_INLINE enabled [ 1119.637430] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1119.645768] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1119.651992] Modules linked in: [ 1119.655166] CPU: 0 PID: 32317 Comm: syz-executor.0 Not tainted 4.14.291-syzkaller #0 [ 1119.663021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 1119.672356] task: ffff888098e70400 task.stack: ffff8880a03c0000 [ 1119.678394] RIP: 0010:kobject_uevent_env+0xb2/0xf30 [ 1119.683379] RSP: 0018:ffff8880a03c7c00 EFLAGS: 00010206 [ 1119.688715] RAX: 0000000000000018 RBX: 0000000000000002 RCX: ffffc90005bea000 [ 1119.695969] RDX: 0000000000003f1a RSI: ffffffff86fe3626 RDI: 00000000000000c0 [ 1119.703211] RBP: ffff8880aeb3c290 R08: ffffffff8b9a6380 R09: 0000000000000003 [ 1119.710457] R10: 0000000000000000 R11: ffff888098e70400 R12: 00000000000000a0 [ 1119.717701] R13: dffffc0000000000 R14: ffff8880aeb3c188 R15: 00000000000000a0 [ 1119.724946] FS: 00007f76a89e4700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 [ 1119.733146] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1119.739000] CR2: 00007f0fccb75fc8 CR3: 000000008823d000 CR4: 00000000003406f0 [ 1119.746247] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1119.753491] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1119.760737] Call Trace: [ 1119.763317] ? lock_downgrade+0x740/0x740 [ 1119.767462] loop_clr_fd+0x59f/0xc20 [ 1119.771171] lo_release+0xff/0x190 [ 1119.774698] ? loop_clr_fd+0xc20/0xc20 [ 1119.778562] __blkdev_put+0x5aa/0x800 [ 1119.782349] ? revalidate_disk+0x1f0/0x1f0 [ 1119.786560] ? locks_remove_file+0x2cd/0x420 [ 1119.790959] ? blkdev_put+0x75/0x4c0 [ 1119.794647] ? blkdev_put+0x4c0/0x4c0 [ 1119.798420] blkdev_close+0x86/0xb0 [ 1119.802020] __fput+0x25f/0x7a0 [ 1119.805278] task_work_run+0x11f/0x190 [ 1119.809147] exit_to_usermode_loop+0x1ad/0x200 [ 1119.813707] do_syscall_64+0x4a3/0x640 [ 1119.817573] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1119.822741] RIP: 0033:0x7f76aa021ebb [ 1119.826433] RSP: 002b:00007f76a89e3f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1119.834111] RAX: 0000000000000000 RBX: 00007f76a89e46b8 RCX: 00007f76aa021ebb [ 1119.841355] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1119.848691] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 1119.855939] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000010 [ 1119.863182] R13: 0000000000000004 R14: 0000000020000318 R15: 0000000000000001 [ 1119.870426] Code: 03 42 80 3c 28 00 0f 85 dd 0b 00 00 4d 8b 64 24 18 4d 85 e4 0f 84 fa 0b 00 00 e8 5a 11 57 fa 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 d4 0b 00 00 49 8b 6c 24 20 48 85 ed 74 b0 [ 1119.889499] RIP: kobject_uevent_env+0xb2/0xf30 RSP: ffff8880a03c7c00 [ 1119.900200] ---[ end trace 6d05c97dba6505c6 ]--- [ 1119.908369] Kernel panic - not syncing: Fatal exception [ 1119.913879] Kernel Offset: disabled [ 1119.917484] Rebooting in 86400 seconds..