syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) syz_mount_image$iso9660(&(0x7f0000000140), 0x0, 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000001700)="112a7300d3176434dd1168d06d2653e1efc946bff2cf57ff18d371a9c4809333c66020390ad301078fae88de9370469b7228bfa88ae875249135894dc22f6ed85cfba6d7aa979cd57a3897bccffbb61c1a95b5deca3179626edc3b73f66bba8d7fcf07cd8b38100dc9a24584448e124471197f8bfe6f94c01a945778f0ce68d8fdcb3483e4c28f6989174bae1d5f4f10ed", 0x91, 0x101}, {&(0x7f0000000240)="19ca30e8c14c63b0d66ad0be324cd037a0eaa8a66791142b5ea7a765c72e10e6563f54570972c9da8d2b5407526c4144560f62f10ea686e48904fbcd73906d52cc15b1169b1a995e5ae791a0c53394a1a4d4ce2636", 0x55, 0x10001}], 0x2, &(0x7f00000017c0)={[{@check_relaxed}, {@hide}, {@mode={'mode', 0x3d, 0x7}}, {@check_strict}, {@cruft}], [{@uid_gt={'uid>', 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, '*U'}}, {@dont_hash}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000001d40)={@id={0x2, 0x0, @b}}) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000500)=""/4096, 0x1000) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86)