getuid() clone3(&(0x7f0000000680)={0x0, &(0x7f0000000400), 0x0, 0x0, {}, &(0x7f00000004c0)=""/153, 0x99, &(0x7f0000000580)=""/151, &(0x7f0000000640)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) open$dir(&(0x7f0000002800)='./file0\x00', 0x0, 0x0) getresgid(0x0, &(0x7f0000002880), 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002900), 0x40000, 0x0) syz_io_uring_setup(0x13f2, &(0x7f0000002940)={0x0, 0x6cd9, 0x28, 0x0, 0x12b}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000029c0), 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000002c00)='/proc/self/attr/fscreate\x00', 0x2, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000002d00), &(0x7f0000002d40)='./file0\x00', 0x0, 0x4, &(0x7f0000002f80)=[{&(0x7f0000002d80)="0f4f6dbf3096737f6feec55e454430749614b67fb5fc6a5ad061565c259929eb2380d51407c6a075ea3c25b41affcdd35001c95da7c3da8c60a61f1bb38c1e6e5155d66f5f33af630d7d0350bae1d13c7a0841ded446f4a83ef0f5d640a62ba85b5fe6aa4e7466783ca1c3d3ff500828e6b798762a1dcb2839b7be2cf1", 0x7d, 0x6}, {&(0x7f0000002e00)="1b6d552b4c6bf164758c7008e4411fbefb2d76577a7aa920ca2a2bc28ed03e60a9585d6b7704acbf0678344c78b9bfd49f4dfe617e80417737413cc64f627190116e327b841baa013637f9b628a6c07ac0bb0e0c44d5e66ff4df147f2d6fc9bca943b12fb86f4f77f807d52c3d09ecf156959d6fc234979b7107428301a317bf0e08d6ff57eee3c8c08d6ffd601162bbb84bfb9a81e356676f283968054bd051e0bf2c1d85194c631832e05883599cdcea59600e11dd415cbad8fad2d125192c4dceac70a87d461e5cd4f7e3e6c204414874ae87f541880ad2048f3d1cfaf4e0385056edb4744995c02ebd09fc335ba0ca110c69b789ba", 0xf7, 0x87}, {&(0x7f0000002f00)="572933a92c276a4f45638951441e978a805bbd15bf6951892a000e5a4ba5a1a583bbf9eb096359c503ff60c4", 0x2c, 0xb9}, {&(0x7f0000002f40)="68005d0a2d5070e603893ee8ca4961a2152f508c931323", 0x17, 0xfff}], 0x2600000, &(0x7f0000003000)={[{@nojoliet}, {@check_relaxed}], [{@fsname={'fsname', 0x3d, '['}}, {@context={'context', 0x3d, 'staff_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '#.%%:$[}'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@appraise}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000003080)) getxattr(&(0x7f0000003280)='./file0\x00', &(0x7f00000032c0)=@known='trusted.overlay.redirect\x00', &(0x7f0000003300)=""/53, 0x35) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003380)='./cgroup/syz1\x00', 0x200002, 0x0)