{0x7}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 474.772455] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 474.812477] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 474.897870] EXT4-fs (loop5): unsupported descriptor size 0 19:06:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 474.951480] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 474.962496] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:06:55 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x8}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:06:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 475.254160] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:06:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:55 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x9}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 475.358775] EXT4-fs (loop5): unsupported descriptor size 0 [ 475.370095] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 475.396523] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 475.430715] EXT4-fs (loop0): re-mounted. Opts: [ 475.510279] EXT4-fs (loop1): Unrecognized mount option "" or missing value 19:06:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:55 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0xa}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:06:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 475.699392] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:06:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 475.770589] EXT4-fs (loop2): re-mounted. Opts: [ 475.793699] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 475.833298] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 19:06:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 475.851670] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:06:56 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0xc}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 475.959611] EXT4-fs (loop5): unsupported descriptor size 0 19:06:56 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0xe}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:06:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 476.099269] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 476.159173] EXT4-fs (loop2): re-mounted. Opts: 19:06:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 476.252144] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 19:06:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:56 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x10}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:06:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) [ 476.328398] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 476.363415] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 476.399767] EXT4-fs (loop1): re-mounted. Opts: 19:06:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 476.501344] EXT4-fs (loop5): unsupported descriptor size 0 [ 476.529906] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:06:56 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x1c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:06:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 476.776233] EXT4-fs (loop0): Unrecognized mount option "" or missing value 19:06:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) [ 476.929649] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 476.946058] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 476.947765] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:06:57 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x48}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 476.994115] EXT4-fs (loop2): re-mounted. Opts: 19:06:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:57 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x4c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 477.244808] EXT4-fs (loop5): unsupported descriptor size 0 19:06:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 477.339485] EXT4-fs (loop0): Unrecognized mount option "" or missing value 19:06:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) [ 477.529142] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 477.539942] EXT4-fs (loop5): unsupported descriptor size 0 [ 477.550823] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:06:57 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x60}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:06:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 477.601809] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:06:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 477.725162] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 19:06:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:58 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x68}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 477.836926] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 477.918919] EXT4-fs (loop2): re-mounted. Opts: [ 477.954313] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 477.960627] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:06:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 478.006998] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:06:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:58 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x6c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 478.223267] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 19:06:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 478.321893] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:06:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:58 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x74}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 478.454358] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 478.521157] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:06:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 478.565195] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 478.572946] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 19:06:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 478.647117] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 478.659971] EXT4-fs (loop2): re-mounted. Opts: 19:06:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:58 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 478.829652] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 478.847505] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 478.860772] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 478.903946] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 478.940930] EXT4-fs (loop2): re-mounted. Opts: 19:06:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:59 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0xdd}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 479.021303] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 19:06:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 479.318909] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 479.327487] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:06:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 479.420538] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 479.438024] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:06:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 479.554790] EXT4-fs (loop0): re-mounted. Opts: 19:06:59 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0xff}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 479.650694] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:06:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:06:59 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 479.724376] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 479.780095] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:07:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 479.877441] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:00 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 480.093546] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:07:00 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 480.306471] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 480.341009] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 480.372161] EXT4-fs (loop0): re-mounted. Opts: 19:07:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:00 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 480.663190] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:07:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:01 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 480.930531] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 480.943670] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 480.967373] EXT4-fs (loop0): re-mounted. Opts: 19:07:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:01 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:01 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x7}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 481.340203] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 481.359826] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:07:01 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x8}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:02 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x9}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 482.017948] EXT4-fs (loop1): re-mounted. Opts: 19:07:02 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0xa}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 482.292825] EXT4-fs (loop0): re-mounted. Opts: 19:07:02 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0xc}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 482.398843] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:07:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:02 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0xe}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 482.794098] EXT4-fs (loop0): re-mounted. Opts: 19:07:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:03 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x10}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 483.076939] EXT4-fs (loop2): Unrecognized mount option "" or missing value [ 483.089730] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:07:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 483.117594] EXT4-fs (loop0): re-mounted. Opts: 19:07:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 483.291120] EXT4-fs (loop4): re-mounted. Opts: 19:07:03 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x1c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 483.384590] EXT4-fs (loop2): re-mounted. Opts: 19:07:03 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x48}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 483.524286] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:07:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:03 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x4c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 483.768122] EXT4-fs (loop4): re-mounted. Opts: [ 483.813069] EXT4-fs (loop2): re-mounted. Opts: 19:07:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 483.902803] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:07:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 483.993383] EXT4-fs (loop0): re-mounted. Opts: 19:07:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:04 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 484.190084] EXT4-fs (loop4): re-mounted. Opts: 19:07:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:04 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x68}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 484.408742] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:07:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 484.524047] EXT4-fs (loop0): re-mounted. Opts: 19:07:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 484.689732] EXT4-fs (loop4): re-mounted. Opts: 19:07:05 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x6c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 484.822071] EXT4-fs (loop5): invalid first ino: 0 19:07:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:05 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x74}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 485.097421] EXT4-fs (loop0): re-mounted. Opts: 19:07:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:05 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 485.302853] EXT4-fs (loop5): invalid first ino: 0 [ 485.328778] EXT4-fs (loop4): re-mounted. Opts: [ 485.347632] EXT4-fs (loop1): re-mounted. Opts: 19:07:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 485.582138] EXT4-fs (loop0): re-mounted. Opts: 19:07:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:05 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0xdd}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 485.702498] EXT4-fs (loop5): invalid first ino: 0 19:07:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 485.900996] EXT4-fs (loop0): re-mounted. Opts: 19:07:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:06 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0xff}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:06 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, 0x0) 19:07:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 486.193577] EXT4-fs (loop4): re-mounted. Opts: [ 486.207440] EXT4-fs (loop1): re-mounted. Opts: 19:07:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:06 executing program 0: [ 486.338709] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 19:07:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:06 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 486.490791] EXT4-fs (loop4): re-mounted. Opts: 19:07:06 executing program 0: 19:07:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 486.618804] EXT4-fs (loop1): re-mounted. Opts: 19:07:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:07 executing program 0: 19:07:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:07 executing program 0: [ 486.976900] EXT4-fs (loop1): re-mounted. Opts: 19:07:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:07 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 487.084749] EXT4-fs (loop2): re-mounted. Opts: [ 487.099536] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 19:07:07 executing program 0: 19:07:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 487.269669] EXT4-fs (loop4): re-mounted. Opts: 19:07:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:07 executing program 0: 19:07:07 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 487.360905] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 19:07:07 executing program 0: [ 487.515277] EXT4-fs (loop1): re-mounted. Opts: [ 487.648058] EXT4-fs (loop2): re-mounted. Opts: 19:07:07 executing program 0: 19:07:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:07 executing program 0: 19:07:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:08 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:08 executing program 0: 19:07:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:08 executing program 0: [ 488.063857] EXT4-fs (loop2): re-mounted. Opts: [ 488.120539] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 19:07:08 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:08 executing program 0: [ 488.232638] EXT4-fs (loop4): re-mounted. Opts: 19:07:08 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:08 executing program 0: 19:07:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:08 executing program 0: [ 488.570082] EXT4-fs (loop1): re-mounted. Opts: 19:07:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:08 executing program 0: 19:07:08 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 488.828233] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 19:07:09 executing program 0: [ 488.879366] EXT4-fs (loop1): re-mounted. Opts: 19:07:09 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:09 executing program 0: 19:07:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:09 executing program 0: 19:07:09 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 489.213830] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 489.328513] EXT4-fs (loop2): re-mounted. Opts: [ 489.347564] EXT4-fs (loop1): re-mounted. Opts: 19:07:09 executing program 0: 19:07:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:09 executing program 0: 19:07:09 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:09 executing program 0: 19:07:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 489.837846] EXT4-fs (loop2): re-mounted. Opts: 19:07:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:10 executing program 0: 19:07:10 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:10 executing program 0: [ 490.128306] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 490.179703] EXT4-fs (loop1): re-mounted. Opts: 19:07:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:10 executing program 0: 19:07:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:10 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 490.296744] EXT4-fs (loop2): re-mounted. Opts: 19:07:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:10 executing program 0: [ 490.502686] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 19:07:10 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:10 executing program 0: 19:07:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 490.607329] EXT4-fs (loop1): re-mounted. Opts: [ 490.627340] EXT4-fs (loop2): re-mounted. Opts: 19:07:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:11 executing program 0: 19:07:11 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:11 executing program 0: [ 491.049617] EXT4-fs (loop2): re-mounted. Opts: 19:07:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:11 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x48}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:11 executing program 0: [ 491.227239] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 19:07:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:11 executing program 0: 19:07:11 executing program 0: 19:07:11 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 491.526555] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 19:07:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:11 executing program 0: 19:07:11 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:11 executing program 0: 19:07:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 491.767679] EXT4-fs (loop2): re-mounted. Opts: [ 491.798713] EXT4-fs (loop4): re-mounted. Opts: 19:07:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:12 executing program 0: 19:07:12 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x68}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 491.960391] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 492.061890] EXT4-fs (loop1): re-mounted. Opts: 19:07:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:12 executing program 0: 19:07:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:12 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:12 executing program 0: [ 492.327882] EXT4-fs (loop2): re-mounted. Opts: 19:07:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 492.514954] EXT4-fs (loop1): re-mounted. Opts: 19:07:12 executing program 0: 19:07:12 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x74}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:12 executing program 0: [ 492.692426] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 492.705733] EXT4-fs (loop2): re-mounted. Opts: [ 492.809147] EXT4-fs (loop1): re-mounted. Opts: 19:07:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:13 executing program 0: 19:07:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:13 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:13 executing program 0: [ 493.140140] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 493.177138] EXT4-fs (loop2): re-mounted. Opts: 19:07:13 executing program 0: 19:07:13 executing program 0: 19:07:13 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xdd}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66146, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:07:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0xb1, 0x0, 0x0, 0xffffffff}, {0x6}]}, 0x10) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x2276, 0xfffffffffffffffd) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000040)={0x2}) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x4) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200, 0x0) [ 493.548933] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:07:13 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf0}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 493.622529] EXT4-fs (loop2): re-mounted. Opts: [ 493.624697] EXT4-fs (loop1): re-mounted. Opts: 19:07:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 493.918571] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 494.015944] EXT4-fs mount: 100 callbacks suppressed [ 494.015960] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 494.108978] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 494.224305] EXT4-fs (loop4): Unrecognized mount option "" or missing value 19:07:14 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0xfffffffffffffffe, 0x0) 19:07:15 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 494.942517] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:07:15 executing program 0: getresuid(&(0x7f0000000100), &(0x7f00000011c0), &(0x7f0000001200)) 19:07:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 494.997927] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 495.064850] EXT4-fs (loop2): re-mounted. Opts: 19:07:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 495.086774] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2a, 0x0, 0x0) 19:07:15 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 495.176618] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 495.197181] EXT4-fs (loop4): re-mounted. Opts: 19:07:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 495.259073] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:15 executing program 0: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8120bb, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id'}}) 19:07:15 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x700}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 495.342833] EXT4-fs (loop2): re-mounted. Opts: 19:07:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x2, 0x0) lseek(r0, 0x0, 0x0) [ 495.406334] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 495.466244] EXT4-fs (loop4): re-mounted. Opts: 19:07:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:15 executing program 0: r0 = semget(0x2, 0x0, 0x0) semctl$GETPID(r0, 0x0, 0xd, 0x0) [ 495.559027] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:07:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:15 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:15 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000040)=0x8fe, 0x4) [ 495.701131] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 495.717264] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001280)=[{&(0x7f0000000100)="ac", 0x1}, {&(0x7f0000001140)="d2", 0x1}, {&(0x7f00000011c0)="9e424e", 0x3}], 0x3}}], 0x1, 0x0) 19:07:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 495.792474] EXT4-fs (loop4): re-mounted. Opts: [ 495.795329] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:07:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(0x0, 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:16 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:16 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@l2tp={0x2, 0x0, @empty}, 0x80) sendmsg$sock(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="c6d87db8a830db8c3f6d6047def0ea16ee103d1795a2f1757454d9541bc1f4ffa119e539006371eb93be900c6aaf3cdcdf54699fb7925231eed83298f5f56cfeb0b3a652273e13b3f2bb68e464c2e8c1f64585", 0x53}, {&(0x7f0000001240)="d0af55c14d31b6eb9fa474a324575ebc96ef93186b4bea0f775b37b94a61371d119bc19cceac47fc231cc8bdd22f36a8b175cecd359390752f37d0845ba5b96b9d3995e065d85085edaec6a74758b715b9e859bea619ea64ab55569b0e290887a94216d382168c7315f66bbc1b717d1fa5f6874c27479a449dbb54a461e645b6fbf7d55a0cf72ab96999b9742041a08b0c659047d81698f2a7abc09674b1f50d1b56617c9faa170243f981f5551f44ddf99ecf208c259da4b85e386a1853127c767b93eb724832220479a56d7228e16b3618a5f1bbfb333eeeb56f530e81a9be1dd8aa4c69f0cb3672c289d1", 0xec}, {&(0x7f0000001340)="5dde7f0787e3c3797afe9421eeee87532c3392cc697ec5c7df8e3a376d5b3ac1d6e6442a93eb9a5baddc8d5c9fec3e9c6565406df65d8c900d1fbe853ebccd1685886dc42dd31216d6c9a8bd026d7a1d7dac7c5b0a5e53dd3ae5b96b24fd7b04efaa0dfcabb9067fe05e8d1d6a0bc2b29a77840eaac6b1c2d76fcb7da07394e270e9039dc7fed4cc4a6ffba5c19e6f7adc954496909ef3d78777541feca53f", 0x9f}, {&(0x7f0000001400)="9ecbcd346a28713b822ffb19a308ae6ee58d7ab9cc761a99ff6a0e5d1649610eae2eaccf3d25b573385987ba7a9fcc6dcda3d7ef9a49e726bc3bc61b474baba9c9a64956ba53b258958a49137b94666d57a42f7d5522b87caff95ff065eaba48a8a232e8c5f4d0a383f9fcf3654e862520f4f6a74b1af8cec56d9ea797b82fb973002cb15db6b1f67c4a7584f0ddb24b5b9803e8065b4fac7da741d9eda10d51f8ff", 0xa2}], 0x5}, 0x0) [ 495.957064] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 495.992987] EXT4-fs (loop5): re-mounted. Opts: 19:07:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(0x0, 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:16 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) [ 496.066515] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 496.081220] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 496.093582] EXT4-fs (loop4): re-mounted. Opts: 19:07:16 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 496.275249] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:07:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000700)=[{{&(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10, 0x0}}, {{&(0x7f00000001c0)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b8000000000000000000070f68ac141437ac1414aaac1414bb018904ef7a441420b000000004000000010000008200000400072b2bffffff77424bd19ebcf0144fd87b6dffac8291bbe0000001ac1414aa6414bb007f000001ac1414130a010100ffffffffac1414bb891b83ac1414aae0000001ffffffffac141416ffffffff00000000440c9d10000000bc00000001442c4923ac1414aa00000008ac1e010100000009e0000002000000080a010101000080006401010100000009"], 0xe8}}], 0x2, 0x0) 19:07:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:16 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:16 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @multicast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {{0x0, 0x0, 0x1, 0x0, 0xa, 0x1, 0x0, 0x4}, {}, {}, {0x8, 0x57}}}}}}, 0x0) [ 496.406830] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 496.419431] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 496.438883] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(0x0, 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 496.514066] EXT4-fs (loop2): re-mounted. Opts: 19:07:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:16 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000002f80)=[{{&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80, 0x0}}, {{&(0x7f0000000080)=@nl=@unspec, 0x80, 0x0}}], 0x2, 0x0) 19:07:16 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1c00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 496.667281] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 496.703492] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0xb1}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) [ 496.738696] EXT4-fs (loop4): re-mounted. Opts: 19:07:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:17 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1f00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 496.851440] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 496.921589] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 496.955856] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:07:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:17 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2000}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 497.134069] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 497.154965] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 497.198409] EXT4-fs (loop5): re-mounted. Opts: 19:07:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0xb1}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 19:07:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 497.248245] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:17 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3f00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 497.305979] EXT4-fs (loop2): re-mounted. Opts: [ 497.329621] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 497.422673] EXT4-fs (loop1): re-mounted. Opts: 19:07:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:17 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4800}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 497.446015] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 497.581472] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 497.625133] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:17 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4c00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 497.772879] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 497.783296] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 497.848052] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 498.021252] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 498.096247] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 498.123002] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 498.165136] EXT4-fs (loop1): re-mounted. Opts: [ 498.199502] EXT4-fs (loop4): re-mounted. Opts: 19:07:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0xb1}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 19:07:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:18 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5865}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 498.483856] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 498.492620] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:18 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 498.527343] EXT4-fs (loop4): re-mounted. Opts: 19:07:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 498.568638] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 498.606959] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 498.642723] EXT4-fs (loop1): re-mounted. Opts: [ 498.689830] EXT4-fs (loop2): re-mounted. Opts: [ 498.756515] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x2000, 0x0) 19:07:19 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6558}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 498.800661] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 498.869003] EXT4-fs (loop4): re-mounted. Opts: 19:07:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0xb1}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 19:07:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 498.957866] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 498.988533] EXT4-fs (loop2): re-mounted. Opts: 19:07:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 499.058678] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:07:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x2000, 0x0) 19:07:19 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6800}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 499.156410] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 499.186800] EXT4-fs (loop5): re-mounted. Opts: 19:07:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 499.248991] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 499.296467] EXT4-fs (loop4): re-mounted. Opts: [ 499.306667] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 499.452226] EXT4-fs (loop1): re-mounted. Opts: 19:07:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 499.480754] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:19 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6c00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 499.636418] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) [ 499.747527] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 499.777027] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 499.832994] EXT4-fs (loop5): re-mounted. Opts: [ 500.019919] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 500.046982] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={0x14, 0x453, 0x0, 0x0, 0x0, '}'}, 0x14}}, 0x0) 19:07:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:20 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7400}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:20 executing program 0: syz_mount_image$fuse(&(0x7f0000000140)='fuse\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x1808800, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}}) [ 500.197241] audit: type=1107 audit(1603307240.386:33): pid=9620 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 msg='}' 19:07:20 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7a00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 500.350179] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 500.360433] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 500.379220] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000e1f4655fe1f4655f0100f03f53ef010001000000e0f4655f000000040000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed41000000100000e0f4655fe1f4655fe1f4655f000000000000040008", 0x1d, 0x4100}, {0x0, 0x0, 0x2004080}], 0x0, &(0x7f0000000080)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}, {@init_itable='init_itable'}]}) 19:07:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:07:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:20 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8100}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:20 executing program 1: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:07:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'lo\x00', @ifru_data=0x0}) [ 500.610767] EXT4-fs (loop0): mounted filesystem without journal. Opts: jqfmt=vfsv1,init_itable,,errors=continue [ 500.621703] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:20 executing program 0: r0 = socket(0x1, 0x3, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8801) [ 500.754937] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 500.756145] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:21 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xdd00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:21 executing program 1: semget(0x2, 0x0, 0x61b) 19:07:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 500.935707] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:21 executing program 1: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x800) [ 501.038086] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:21 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf000}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:21 executing program 0: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0xf6ffffff00000000, 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 501.094412] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 501.164176] EXT4-fs (loop2): re-mounted. Opts: 19:07:21 executing program 1: set_mempolicy(0x8003, &(0x7f0000000bc0)=0x1, 0x4) 19:07:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:21 executing program 0: r0 = socket(0x2, 0xa, 0x0) recvmsg$can_raw(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5e}, 0x0) 19:07:21 executing program 1: io_setup(0x6bd, &(0x7f0000002fc0)=0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001680)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001640)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 19:07:21 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 501.372622] EXT4-fs (loop4): re-mounted. Opts: 19:07:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:21 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) connect(r0, &(0x7f0000000140)=@l2tp={0x2, 0x0, @empty}, 0x80) 19:07:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, @l2tp={0x2, 0x0, @multicast1}, @l2tp={0x2, 0x0, @multicast1}}) 19:07:22 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 501.862247] EXT4-fs (loop2): re-mounted. Opts: [ 501.868285] EXT4-fs (loop4): re-mounted. Opts: 19:07:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x238b73680157c587, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 502.156474] EXT4-fs (loop2): re-mounted. Opts: 19:07:22 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=[{0x10}, {0x10}], 0x20}}], 0x1, 0x0) 19:07:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:22 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', 0x0, 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:22 executing program 1: r0 = socket(0x11, 0x3, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0, 0x16c}}, 0x0) 19:07:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_cmd={0xb}}) [ 502.434619] EXT4-fs (loop4): re-mounted. Opts: 19:07:22 executing program 0: add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) [ 502.457615] EXT4-fs (loop2): re-mounted. Opts: 19:07:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:22 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f00000000c0)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PEERS={0xd54, 0x8, 0x0, 0x1, [{0x644, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x570, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @multicast2}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @remote}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc20xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x0, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:22 executing program 1: perf_event_open(&(0x7f0000000140)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:07:22 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f00000006c0)=@generic={0x0, "87a11412836e91d49dc22fc24fbf6b17f25d2311a50c8a2470e577eb1099205dc4610b866f1496e8aa6c13578e7d04377b489eece7fea6e57488b15a7476e740f666ef61968da0a8cb75f07d121ca84cb8bc214d4a5a70b843e5d372e9d40f3a39c4d465f2bff542dc4367f43bdc320cca4fafdbd028b157aaa96e7851cf"}, 0x80, 0x0, 0x0, &(0x7f0000004740)=ANY=[], 0x240}}], 0x2, 0x0) [ 502.704143] IPv6: ADDRCONF(NETDEV_UP): bond1069: link is not ready [ 502.729530] 8021q: adding VLAN 0 to HW filter on device bond1069 19:07:22 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 502.854133] EXT4-fs (loop4): re-mounted. Opts: 19:07:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, @in={0x2, 0x0, @multicast2}, @phonet, @l2tp={0x2, 0x0, @broadcast}}) [ 502.969431] EXT4-fs (loop2): re-mounted. Opts: 19:07:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:23 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f0000000000)=@tipc=@name={0x1e, 0x8, 0x0, {{0x2}}}, 0x80, 0x0}}], 0x1, 0x0) [ 502.993030] EXT4-fs (loop5): Unrecognized mount option "" or missing value 19:07:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @local}, @sco={0x1f, @none}, @isdn={0x22, 0x0, 0x0, 0x0, 0x2}}) 19:07:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:23 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x0, 0x0) [ 503.200608] EXT4-fs (loop4): re-mounted. Opts: 19:07:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f0000000000)=@tipc=@name={0x1e, 0x8, 0x0, {{0x2}}}, 0x80, 0x0}}], 0x1, 0x0) 19:07:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80, 0x0}}], 0x1, 0x0) 19:07:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 503.317247] EXT4-fs (loop2): re-mounted. Opts: [ 503.390654] IPv6: ADDRCONF(NETDEV_UP): bond1071: link is not ready [ 503.419986] EXT4-fs (loop5): re-mounted. Opts: 19:07:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x0, 0x0) 19:07:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 503.447979] 8021q: adding VLAN 0 to HW filter on device bond1071 19:07:23 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 19:07:23 executing program 0: r0 = semget(0x3, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 19:07:23 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 503.539732] EXT4-fs (loop4): re-mounted. Opts: 19:07:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:23 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000140)={0x0, 0x0, 0x16, 0x0, 0x0, 0x2}) 19:07:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000000)={'syz_tun\x00', @ifru_data=0x0}) 19:07:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:24 executing program 1: r0 = socket(0x2, 0x3, 0x7) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 19:07:24 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890b, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @multicast1}, @l2tp={0x2, 0x0, @local}, @ax25={0x3, @default}, 0x74, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='syz_tun\x00'}) [ 503.874562] EXT4-fs (loop2): re-mounted. Opts: 19:07:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80, 0x0}}], 0x1, 0x0) 19:07:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_cmd={0x4d}}) 19:07:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000480)={0xfffffffffffffe84, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x130, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x5c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}]}, 0x144}}, 0x0) 19:07:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@rr={0x7, 0x3}]}}}], 0x18}}], 0x1, 0x0) 19:07:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 504.120350] IPv6: ADDRCONF(NETDEV_UP): bond1073: link is not ready [ 504.155164] 8021q: adding VLAN 0 to HW filter on device bond1073 19:07:24 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000400)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x2000, 0x0}, &(0x7f0000000040)="4e0a2191f30a", 0x0, 0x0, 0x0, 0x0, 0x0}) 19:07:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) 19:07:24 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:24 executing program 0: set_mempolicy(0x1, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 19:07:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x4, 0x4) 19:07:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x8, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:07:24 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="70000000000119050301000008000000027d0000240001001400010008000100ffffffff08000200ac1e00f70b0002000500010000000000240002000c0002000500010000000000140001"], 0x70}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x6000002, 0x0, 0x4004000}, 0x0) 19:07:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={0x0}}, 0x14080) 19:07:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:24 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 504.642812] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 504.685407] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:07:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:24 executing program 1: set_mempolicy(0x2, &(0x7f0000000bc0)=0x1f, 0x4) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) 19:07:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect(r0, &(0x7f0000000000)=@l2tp={0x2, 0x0, @dev}, 0x80) 19:07:25 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="70000000000119050301000008000000027d0000240001001400010008000100ffffffff08000200ac1e00f70b0002000500010000000000240002000c0002000500010000000000140001"], 0x70}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x6000002, 0x0, 0x4004000}, 0x0) 19:07:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x8, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 504.924138] IPv6: ADDRCONF(NETDEV_UP): bond1075: link is not ready [ 504.955094] 8021q: adding VLAN 0 to HW filter on device bond1075 19:07:25 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="70000000000119050301000008000000027d0000240001001400010008000100ffffffff08000200ac1e00f70b0002000500010000000000240002000c0002000500010000000000140001"], 0x70}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x6000002, 0x0, 0x4004000}, 0x0) 19:07:25 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, r0) 19:07:25 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x8, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:07:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:25 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:07:25 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@l2tp={0x2, 0x0, @empty}, 0x80) sendmsg$sock(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="c6d87db8a830db8c3f6d6047def0ea16ee103d1795a2f1757454d9541bc1f4ffa119e539006371eb93be900c6aaf3cdcdf54699fb7925231eed83298f5f56cfeb0b3a652273e13b3f2bb68e464c2e8c1f64585", 0x53}, {&(0x7f0000001240)="d0af55c14d31b6eb9fa474a324575ebc96ef93186b4bea0f775b37b94a61371d119bc19cceac47fc231cc8bdd22f36a8b175cecd359390752f37d0845ba5b96b9d3995e065d85085edaec6a74758b715b9e859bea619ea64ab55569b0e290887a94216d382168c7315f66bbc1b717d1fa5f6874c27479a449dbb54a461e645b6fbf7d55a0cf72ab96999b9742041a08b0c659047d81698f2a7abc09674b1f50d1b56617c9faa170243f981f5551f44ddf99ecf208c259da4b85e386a1853127c767b93eb724832220479a56d7228e16b3618a5f1bbfb333eeeb56f530e81a9be1dd8aa4c69f0cb3672c289d1", 0xec}, {&(0x7f0000001340)="5dde7f0787e3c3797afe9421eeee87532c3392cc697ec5c7df8e3a376d5b3ac1d6e6442a93eb9a5baddc8d5c9fec3e9c6565406df65d8c900d1fbe853ebccd1685886dc42dd31216d6c9a8bd026d7a1d7dac7c5b0a5e53dd3ae5b96b24fd7b04efaa0dfcabb9067fe05e8d1d6a0bc2b29a77840eaac6b1c2d76fcb7da07394e270e9039dc7fed4cc4a6ffba5c19e6f7adc954496909ef3d78777541feca53f", 0x9f}, {&(0x7f0000001400)="9ecbcd346a28713b822ffb19a308ae6ee58d7ab9cc761a99ff6a0e5d1649610eae2eaccf3d25b573385987ba7a9fcc6dcda3d7ef9a49e726bc3bc61b474baba9c9a64956ba53b258958a49137b94666d57a42f7d5522b87caff95ff065eaba48a8a232e8c5f4d0a383f9fcf3654e862520f4f6a74b1af8cec56d9ea797b82fb973002cb15db6b1f67c4a7584f0ddb24b5b9803e8065b4fac7da741d9eda10d51f8ff", 0xa2}], 0x5}, 0x0) [ 505.301059] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 19:07:25 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self\x00', 0x200180, 0x0) signalfd(r0, &(0x7f00000001c0), 0x8) [ 505.345828] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 505.345957] EXT4-fs (loop4): re-mounted. Opts: 19:07:25 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x6bd, &(0x7f0000002fc0)=0x0) io_submit(r1, 0x1, &(0x7f0000001900)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:07:26 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x14a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:07:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x8, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:07:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:26 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:26 executing program 1: socket$packet(0x11, 0x2, 0x300) select(0x65, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 19:07:26 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000240)={0x0, 0x2}) 19:07:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f00000000c0)={'syz_tun\x00', @ifru_data=0x0}) [ 506.156245] EXT4-fs (loop5): re-mounted. Opts: [ 506.166136] ptrace attach of "/root/syz-executor.0"[10771] was attempted by "/root/syz-executor.0"[10793] 19:07:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040)=0x80800001, 0x57) 19:07:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:26 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x28}, {0x6}]}, 0x10) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 19:07:26 executing program 1: add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000200)="fb", 0x1, 0xfffffffffffffffc) 19:07:26 executing program 0: setuid(0xee01) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) [ 506.373603] EXT4-fs (loop5): re-mounted. Opts: 19:07:26 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000280)=[{{&(0x7f0000000000)=@nfc={0x27, 0x1, 0x0, 0x7}, 0x80, 0x0}}], 0x1, 0x0) 19:07:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:26 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@l2tp={0x2, 0x0, @empty}, 0x80) sendmsg$sock(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="c6d87db8a830db8c3f6d6047def0ea16ee103d1795a2f1757454d9541bc1f4ffa119e539006371eb93be900c6aaf3cdcdf54699fb7925231eed83298f5f56cfeb0b3a652273e13b3f2bb68e464c2e8c1f64585", 0x53}, {&(0x7f0000001240)="d0af55c14d31b6eb9fa474a324575ebc96ef93186b4bea0f775b37b94a61371d119bc19cceac47fc231cc8bdd22f36a8b175cecd359390752f37d0845ba5b96b9d3995e065d85085edaec6a74758b715b9e859bea619ea64ab55569b0e290887a94216d382168c7315f66bbc1b717d1fa5f6874c27479a449dbb54a461e645b6fbf7d55a0cf72ab96999b9742041a08b0c659047d81698f2a7abc09674b1f50d1b56617c9faa170243f981f5551f44ddf99ecf208c259da4b85e386a1853127c767b93eb724832220479a56d7228e16b3618a5f1bbfb333eeeb56f530e81a9be1dd8aa4c69f0cb3672c289d1", 0xec}, {&(0x7f0000001340)="5dde7f0787e3c3797afe9421eeee87532c3392cc697ec5c7df8e3a376d5b3ac1d6e6442a93eb9a5baddc8d5c9fec3e9c6565406df65d8c900d1fbe853ebccd1685886dc42dd31216d6c9a8bd026d7a1d7dac7c5b0a5e53dd3ae5b96b24fd7b04efaa0dfcabb9067fe05e8d1d6a0bc2b29a77840eaac6b1c2d76fcb7da07394e270e9039dc7fed4cc4a6ffba5c19e6f7adc954496909ef3d78777541feca53f", 0x9f}, {&(0x7f0000001400)="9ecbcd346a28713b822ffb19a308ae6ee58d7ab9cc761a99ff6a0e5d1649610eae2eaccf3d25b573385987ba7a9fcc6dcda3d7ef9a49e726bc3bc61b474baba9c9a64956ba53b258958a49137b94666d57a42f7d5522b87caff95ff065eaba48a8a232e8c5f4d0a383f9fcf3654e862520f4f6a74b1af8cec56d9ea797b82fb973002cb15db6b1f67c4a7584f0ddb24b5b9803e8065b4fac7da741d9eda10d51f8ff", 0xa2}], 0x5}, 0x0) [ 506.622903] EXT4-fs (loop4): re-mounted. Opts: 19:07:26 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5452, &(0x7f0000000040)) 19:07:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:26 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 506.837835] EXT4-fs (loop5): re-mounted. Opts: 19:07:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x6bd, &(0x7f0000002fc0)=0x0) io_submit(r1, 0x1, &(0x7f0000001900)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x255a}]) 19:07:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', 0x0) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:27 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='mqueue\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) [ 507.116793] EXT4-fs (loop4): re-mounted. Opts: 19:07:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f00000000c0)={'syz_tun\x00', @ifru_data=0x0}) 19:07:27 executing program 1: keyctl$set_reqkey_keyring(0xe, 0x2) setuid(0xee01) 19:07:27 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x48}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:27 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='mqueue\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) 19:07:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, 0x0, 0x0) [ 507.589950] EXT4-fs (loop5): Unrecognized mount option "" or missing value 19:07:27 executing program 2: r0 = socket(0x2, 0x3, 0x7) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x300}, 0x0) 19:07:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', 0x0) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:27 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:27 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='mqueue\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) 19:07:28 executing program 2: add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2, 0x2}, &(0x7f0000000200)="fb", 0x1, 0xfffffffffffffffc) 19:07:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8921, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_cmd={0x4d}}) [ 507.903457] EXT4-fs (loop5): re-mounted. Opts: [ 507.996285] EXT4-fs (loop4): re-mounted. Opts: 19:07:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', 0x0) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:28 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='mqueue\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) 19:07:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:28 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:28 executing program 2: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 19:07:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0xc, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24000001) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16d, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "00000000000000000000000000000000ebff00000000000b000000070000000000000000000000000000000000000000000000000000000000000000000000231783876700002000"}, 0xd8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000002c0)=ANY=[@ANYRESDEC], 0x1000001bd) [ 508.327210] EXT4-fs (loop5): re-mounted. Opts: 19:07:28 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x68}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:28 executing program 2: r0 = socket(0x2, 0x3, 0x7) recvmsg$can_raw(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x12140) 19:07:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 508.481598] EXT4-fs (loop4): re-mounted. Opts: 19:07:28 executing program 1: add_key$keyring(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 19:07:28 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)=ANY=[], 0x108, 0x0) 19:07:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x0, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000a40)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast2}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {@in=@remote, @in6=@mcast2}, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0x0, 0x3ff}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x32}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 508.716680] EXT4-fs (loop5): re-mounted. Opts: 19:07:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x68}}, 0x0) 19:07:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:29 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000002a80)='devlink\x00') sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000002c40)={&(0x7f0000002a40), 0xc, &(0x7f0000002c00)={&(0x7f0000002ac0)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6}, {0x8}, {0x5}}]}, 0x54}}, 0x0) [ 508.878488] EXT4-fs (loop4): re-mounted. Opts: 19:07:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0xfffd}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}]}], {0x14}}, 0x84}}, 0x0) 19:07:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001280)=[{&(0x7f0000000100)="ac", 0x1}], 0x1}}], 0x1, 0x0) 19:07:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x0, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f00000000c0)={'syz_tun\x00', @ifru_data=0x0}) 19:07:29 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003bc0)={0x0, 0x989680}) 19:07:29 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) [ 509.115396] EXT4-fs (loop5): re-mounted. Opts: 19:07:29 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x74}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:29 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000086c0)='ns/ipc\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 19:07:29 executing program 0: syz_genetlink_get_family_id$SEG6(&(0x7f0000001dc0)='SEG6\x00') 19:07:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000), 0x4) write$nbd(0xffffffffffffffff, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r1, &(0x7f0000000a40), 0x12) syz_genetlink_get_family_id$devlink(&(0x7f0000002280)='devlink\x00') 19:07:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x0, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:29 executing program 1: socket$inet(0x2, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) pipe(0x0) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 19:07:29 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:29 executing program 2: syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) pipe(0x0) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 19:07:29 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, 0x0) socket$xdp(0x2c, 0x3, 0x0) [ 509.499370] EXT4-fs (loop5): re-mounted. Opts: 19:07:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:29 executing program 1: syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') 19:07:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000580)={'wlan1\x00'}) socket$nl_generic(0x10, 0x3, 0x10) 19:07:29 executing program 0: recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 19:07:29 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xdd}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 509.709550] EXT4-fs (loop4): re-mounted. Opts: 19:07:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000028c0)={&(0x7f0000002800)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000002880)={&(0x7f0000002840)={0x28, 0x2, 0x2, 0x3, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xa, 0x6, 'Q.931\x00'}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}]}, 0x28}}, 0x0) 19:07:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, 0x0) 19:07:30 executing program 2: socket$inet(0x2, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000008c0)) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 19:07:30 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f00000086c0)='ns/ipc\x00') 19:07:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:30 executing program 1: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r0, &(0x7f0000000a40), 0x12) [ 509.958741] IPv6: ADDRCONF(NETDEV_UP): bond1088: link is not ready [ 509.980688] 8021q: adding VLAN 0 to HW filter on device bond1088 19:07:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f000000aa40)=[{{&(0x7f0000007240)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0}}], 0x1, 0x0) 19:07:30 executing program 2: connect$rds(0xffffffffffffffff, 0x0, 0x0) 19:07:30 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 510.097132] EXT4-fs (loop4): re-mounted. Opts: 19:07:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, 0x0) 19:07:30 executing program 1: pipe(&(0x7f000000b040)) [ 510.172191] EXT4-fs (loop5): re-mounted. Opts: 19:07:30 executing program 2: 19:07:30 executing program 0: 19:07:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x0) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:30 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:30 executing program 0: [ 510.355884] EXT4-fs (loop4): re-mounted. Opts: 19:07:30 executing program 2: 19:07:30 executing program 1: 19:07:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, 0x0) 19:07:30 executing program 0: 19:07:30 executing program 1: [ 510.638212] device bond1090 entered promiscuous mode 19:07:30 executing program 2: 19:07:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:30 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:31 executing program 1: 19:07:31 executing program 0: [ 510.829832] EXT4-fs (loop4): re-mounted. Opts: 19:07:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:31 executing program 2: [ 510.964999] device bond1091 entered promiscuous mode 19:07:31 executing program 1: 19:07:31 executing program 0: 19:07:31 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:31 executing program 2: [ 511.090728] EXT4-fs (loop5): re-mounted. Opts: 19:07:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 511.155323] EXT4-fs (loop4): re-mounted. Opts: 19:07:31 executing program 1: 19:07:31 executing program 2: 19:07:31 executing program 0: 19:07:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:31 executing program 0: 19:07:31 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x700}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:31 executing program 1: 19:07:31 executing program 2: [ 511.422087] EXT4-fs (loop5): re-mounted. Opts: 19:07:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(0x0, &(0x7f0000000400)='./file1\x00', 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:31 executing program 0: 19:07:31 executing program 1: [ 511.566056] EXT4-fs (loop4): re-mounted. Opts: 19:07:31 executing program 2: 19:07:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 511.658320] device bond1093 entered promiscuous mode 19:07:31 executing program 1: 19:07:31 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 511.755433] EXT4-fs (loop5): re-mounted. Opts: 19:07:32 executing program 0: 19:07:32 executing program 2: 19:07:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:32 executing program 1: 19:07:32 executing program 0: [ 511.996459] EXT4-fs (loop4): re-mounted. Opts: 19:07:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}, {@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 512.029876] device bond1094 entered promiscuous mode 19:07:32 executing program 1: 19:07:32 executing program 2: 19:07:32 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:32 executing program 0: 19:07:32 executing program 1: [ 512.184102] EXT4-fs (loop5): re-mounted. Opts: 19:07:32 executing program 2: 19:07:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:32 executing program 0: [ 512.359384] EXT4-fs (loop4): re-mounted. Opts: 19:07:32 executing program 1: 19:07:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:32 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:32 executing program 2: 19:07:32 executing program 1: [ 512.547668] EXT4-fs (loop5): re-mounted. Opts: 19:07:32 executing program 0: 19:07:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:32 executing program 1: 19:07:32 executing program 2: 19:07:32 executing program 0: [ 512.773959] EXT4-fs (loop4): re-mounted. Opts: 19:07:33 executing program 1: [ 512.879926] EXT4-fs (loop5): re-mounted. Opts: 19:07:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:33 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:33 executing program 1: 19:07:33 executing program 2: 19:07:33 executing program 0: 19:07:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:33 executing program 1: 19:07:33 executing program 0: 19:07:33 executing program 2: [ 513.205276] EXT4-fs (loop4): re-mounted. Opts: 19:07:33 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1c00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:33 executing program 2: 19:07:33 executing program 1: [ 513.297069] EXT4-fs (loop5): re-mounted. Opts: 19:07:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@space_cache='space_cache'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:33 executing program 0: 19:07:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:33 executing program 2: 19:07:33 executing program 1: 19:07:33 executing program 0: 19:07:33 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1f00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:33 executing program 2: 19:07:33 executing program 1: [ 513.671247] EXT4-fs (loop5): re-mounted. Opts: 19:07:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:33 executing program 0: 19:07:34 executing program 2: 19:07:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x8}], 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:34 executing program 1: [ 513.836986] device bond1099 entered promiscuous mode 19:07:34 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:34 executing program 0: 19:07:34 executing program 2: [ 513.999363] EXT4-fs (loop4): re-mounted. Opts: 19:07:34 executing program 1: 19:07:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) [ 514.072084] EXT4-fs (loop5): re-mounted. Opts: 19:07:34 executing program 2: 19:07:34 executing program 0: 19:07:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:34 executing program 1: 19:07:34 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3f00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:34 executing program 2: 19:07:34 executing program 1: 19:07:34 executing program 0: 19:07:34 executing program 2: 19:07:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) [ 514.531244] device bond1101 entered promiscuous mode 19:07:34 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4800}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:34 executing program 1: 19:07:34 executing program 2: 19:07:34 executing program 0: 19:07:35 executing program 1: 19:07:35 executing program 2: [ 514.808285] EXT4-fs (loop4): re-mounted. Opts: 19:07:35 executing program 0: [ 514.860223] EXT4-fs (loop5): re-mounted. Opts: 19:07:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}]}) 19:07:35 executing program 2: 19:07:35 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, 0x0, 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:35 executing program 0: 19:07:35 executing program 1: 19:07:35 executing program 2: 19:07:35 executing program 1: [ 515.195350] EXT4-fs (loop4): re-mounted. Opts: 19:07:35 executing program 0: [ 515.230064] EXT4-fs (loop5): re-mounted. Opts: 19:07:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}]}) 19:07:35 executing program 2: 19:07:35 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5865}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:35 executing program 1: 19:07:35 executing program 2: 19:07:35 executing program 0: [ 515.551270] IPv6: ADDRCONF(NETDEV_UP): bond1104: link is not ready [ 515.572160] EXT4-fs (loop4): re-mounted. Opts: 19:07:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}]}) 19:07:35 executing program 1: 19:07:35 executing program 2: 19:07:35 executing program 0: [ 515.625593] 8021q: adding VLAN 0 to HW filter on device bond1104 [ 515.652154] EXT4-fs (loop5): re-mounted. Opts: 19:07:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:35 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:36 executing program 1: 19:07:36 executing program 2: 19:07:36 executing program 0: 19:07:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:36 executing program 2: 19:07:36 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6558}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 515.983156] EXT4-fs (loop5): re-mounted. Opts: 19:07:36 executing program 1: [ 516.078522] EXT4-fs (loop4): re-mounted. Opts: 19:07:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:36 executing program 1: 19:07:36 executing program 0: 19:07:36 executing program 2: 19:07:36 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6800}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 516.213866] device bond1106 entered promiscuous mode 19:07:36 executing program 1: [ 516.389752] EXT4-fs (loop5): re-mounted. Opts: 19:07:36 executing program 2: 19:07:36 executing program 0: [ 516.465380] EXT4-fs (loop4): re-mounted. Opts: 19:07:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:36 executing program 1: 19:07:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:36 executing program 2: 19:07:36 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:36 executing program 1: 19:07:36 executing program 0: 19:07:36 executing program 2: [ 516.820642] EXT4-fs (loop5): re-mounted. Opts: 19:07:37 executing program 1: 19:07:37 executing program 2: 19:07:37 executing program 0: [ 516.948950] EXT4-fs (loop4): re-mounted. Opts: 19:07:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:37 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7400}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:37 executing program 1: 19:07:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:37 executing program 0: 19:07:37 executing program 2: 19:07:37 executing program 1: [ 517.165157] EXT4-fs (loop5): re-mounted. Opts: 19:07:37 executing program 0: 19:07:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, 0x0) [ 517.319415] EXT4-fs (loop4): re-mounted. Opts: 19:07:37 executing program 1: 19:07:37 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:37 executing program 2: 19:07:37 executing program 0: [ 517.516019] EXT4-fs (loop5): re-mounted. Opts: 19:07:37 executing program 1: 19:07:37 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:37 executing program 0: 19:07:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, 0x0) 19:07:37 executing program 2: [ 517.647612] EXT4-fs (loop4): re-mounted. Opts: 19:07:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:37 executing program 1: 19:07:38 executing program 2: 19:07:38 executing program 0: r0 = socket(0x2, 0xa, 0x0) recvmsg$can_raw(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5e}, 0x20000041) [ 517.905238] device bond1111 entered promiscuous mode 19:07:38 executing program 1: 19:07:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, 0x0) 19:07:38 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc088}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 518.016105] EXT4-fs (loop4): re-mounted. Opts: 19:07:38 executing program 2: 19:07:38 executing program 0: 19:07:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:38 executing program 1: 19:07:38 executing program 2: [ 518.277253] EXT4-fs (loop5): re-mounted. Opts: 19:07:38 executing program 0: 19:07:38 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xdd00}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:38 executing program 1: 19:07:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:38 executing program 2: [ 518.424445] EXT4-fs (loop4): re-mounted. Opts: 19:07:38 executing program 1: 19:07:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:38 executing program 0: 19:07:38 executing program 2: [ 518.530532] device bond1113 entered promiscuous mode 19:07:38 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf000}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 518.595580] EXT4-fs (loop5): re-mounted. Opts: 19:07:38 executing program 1: 19:07:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:38 executing program 2: 19:07:38 executing program 0: 19:07:38 executing program 1: [ 518.792112] EXT4-fs (loop4): re-mounted. Opts: 19:07:39 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x2000, &(0x7f0000000580)={[{@datacow='datacow'}], [{@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:39 executing program 2: 19:07:39 executing program 1: 19:07:39 executing program 0: [ 518.958294] EXT4-fs (loop5): re-mounted. Opts: 19:07:39 executing program 1: 19:07:39 executing program 2: 19:07:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:39 executing program 0: [ 519.052030] device bond1115 entered promiscuous mode [ 519.066768] IPv6: ADDRCONF(NETDEV_UP): bond1115: link is not ready [ 519.091486] 8021q: adding VLAN 0 to HW filter on device bond1115 19:07:39 executing program 1: [ 519.161642] EXT4-fs (loop4): re-mounted. Opts: 19:07:39 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d91}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:39 executing program 2: 19:07:39 executing program 0: 19:07:39 executing program 1: 19:07:39 executing program 4: [ 519.381327] EXT4-fs (loop5): re-mounted. Opts: 19:07:39 executing program 2: [ 519.437699] device bond1116 entered promiscuous mode 19:07:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:39 executing program 4: 19:07:39 executing program 1: 19:07:39 executing program 0: [ 519.459852] IPv6: ADDRCONF(NETDEV_UP): bond1116: link is not ready [ 519.493541] 8021q: adding VLAN 0 to HW filter on device bond1116 19:07:39 executing program 2: 19:07:39 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d92}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:39 executing program 0: 19:07:39 executing program 4: [ 519.686243] EXT4-fs (loop5): re-mounted. Opts: 19:07:39 executing program 2: 19:07:39 executing program 1: [ 519.771655] device bond1117 entered promiscuous mode 19:07:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:40 executing program 0: 19:07:40 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d93}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:40 executing program 1: 19:07:40 executing program 4: 19:07:40 executing program 2: 19:07:40 executing program 0: 19:07:40 executing program 4: 19:07:40 executing program 1: 19:07:40 executing program 2: [ 520.032180] device bond1118 entered promiscuous mode [ 520.049082] IPv6: ADDRCONF(NETDEV_UP): bond1118: link is not ready [ 520.055620] 8021q: adding VLAN 0 to HW filter on device bond1118 [ 520.078809] EXT4-fs (loop5): re-mounted. Opts: 19:07:40 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d94}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:40 executing program 0: 19:07:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:40 executing program 4: 19:07:40 executing program 1: 19:07:40 executing program 2: 19:07:40 executing program 4: 19:07:40 executing program 0: 19:07:40 executing program 2: 19:07:40 executing program 1: [ 520.420571] device bond1119 entered promiscuous mode [ 520.431011] EXT4-fs (loop5): re-mounted. Opts: 19:07:40 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d95}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:40 executing program 4: 19:07:40 executing program 0: 19:07:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:40 executing program 2: 19:07:40 executing program 1: 19:07:40 executing program 0: 19:07:40 executing program 4: [ 520.754625] device bond1120 entered promiscuous mode 19:07:40 executing program 2: 19:07:41 executing program 1: [ 520.802150] IPv6: ADDRCONF(NETDEV_UP): bond1120: link is not ready [ 520.841954] EXT4-fs (loop5): re-mounted. Opts: 19:07:41 executing program 4: [ 520.853334] 8021q: adding VLAN 0 to HW filter on device bond1120 19:07:41 executing program 0: 19:07:41 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d96}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:41 executing program 2: 19:07:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:41 executing program 1: 19:07:41 executing program 4: 19:07:41 executing program 0: 19:07:41 executing program 2: 19:07:41 executing program 1: 19:07:41 executing program 4: [ 521.237573] device bond1121 entered promiscuous mode [ 521.245925] EXT4-fs (loop5): re-mounted. Opts: 19:07:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@enospc_debug='enospc_debug'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:41 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d97}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:41 executing program 2: 19:07:41 executing program 1: 19:07:41 executing program 0: 19:07:41 executing program 4: 19:07:41 executing program 2: 19:07:41 executing program 1: [ 521.646098] EXT4-fs (loop5): re-mounted. Opts: 19:07:41 executing program 0: 19:07:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:41 executing program 2: 19:07:41 executing program 4: [ 521.691622] device bond1122 entered promiscuous mode 19:07:41 executing program 1: [ 521.728661] IPv6: ADDRCONF(NETDEV_UP): bond1122: link is not ready [ 521.735089] 8021q: adding VLAN 0 to HW filter on device bond1122 19:07:42 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d98}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:42 executing program 0: 19:07:42 executing program 4: 19:07:42 executing program 2: 19:07:42 executing program 1: [ 521.985274] EXT4-fs (loop5): re-mounted. Opts: 19:07:42 executing program 0: 19:07:42 executing program 4: pipe2$9p(&(0x7f0000000040), 0x80000) 19:07:42 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/full\x00', 0x0, 0x0) getsockname$unix(r0, 0x0, 0x0) 19:07:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 522.155636] device bond1123 entered promiscuous mode 19:07:42 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x40, 0x0) 19:07:42 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d99}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETX(r0, 0x5433, 0x0) 19:07:42 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 19:07:42 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 522.353353] EXT4-fs (loop5): re-mounted. Opts: 19:07:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x20, 0x0, 0x0) 19:07:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@datacow='datacow'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:07:42 executing program 4: pselect6(0x0, 0x0, &(0x7f0000002440), 0x0, &(0x7f00000024c0)={0x0, 0x989680}, &(0x7f0000002540)={0x0}) 19:07:42 executing program 1: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)) [ 522.535197] device bond1124 entered promiscuous mode [ 522.554522] IPv6: ADDRCONF(NETDEV_UP): bond1124: link is not ready [ 522.577728] 8021q: adding VLAN 0 to HW filter on device bond1124 19:07:42 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) [ 522.641178] EXT4-fs (loop5): re-mounted. Opts: 19:07:42 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d9a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:42 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000002140)='devices.deny\x00', 0x2, 0x0) 19:07:42 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f000000b440)='/dev/full\x00', 0x0, 0x0) timerfd_gettime(r0, 0x0) 19:07:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:43 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) futimesat(r0, 0x0, &(0x7f00000001c0)={{0x0, 0x2710}, {0x77359400}}) 19:07:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) [ 522.927553] device bond1125 entered promiscuous mode [ 523.009275] EXT4-fs (loop5): re-mounted. Opts: 19:07:43 executing program 2: timer_create(0x5, &(0x7f0000000240)={0x0, 0x40}, &(0x7f0000000000)) 19:07:43 executing program 1: pipe2$9p(0x0, 0x4800) 19:07:43 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d9b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 19:07:43 executing program 4: r0 = epoll_create1(0x0) r1 = eventfd(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000002c0)) 19:07:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@space_cache='space_cache'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 523.518925] EXT4-fs (loop5): re-mounted. Opts: 19:07:43 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 19:07:43 executing program 4: pselect6(0x40, &(0x7f0000002400), 0x0, &(0x7f0000002480), &(0x7f00000024c0)={0x0, 0x989680}, &(0x7f0000002540)={0x0}) 19:07:43 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x80000, 0x0) 19:07:43 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) [ 523.617399] device bond1126 entered promiscuous mode 19:07:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 19:07:43 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x100) [ 523.641700] IPv6: ADDRCONF(NETDEV_UP): bond1126: link is not ready [ 523.670902] 8021q: adding VLAN 0 to HW filter on device bond1126 19:07:43 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, 0x0) 19:07:44 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d9c}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:44 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) timerfd_settime(r0, 0x0, 0x0, 0x0) 19:07:44 executing program 1: semget$private(0x0, 0x3, 0x408) 19:07:44 executing program 0: io_submit(0x0, 0x0, &(0x7f00000023c0)) 19:07:44 executing program 2: fchmodat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 523.882296] EXT4-fs (loop5): re-mounted. Opts: 19:07:44 executing program 1: write$nbd(0xffffffffffffffff, 0x0, 0xba) 19:07:44 executing program 2: io_setup(0x0, &(0x7f000000b4c0)=0x0) io_getevents(r0, 0x7, 0x7, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x0) 19:07:44 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:07:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 524.027657] device bond1127 entered promiscuous mode 19:07:44 executing program 2: timer_create(0x0, &(0x7f0000001100)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) [ 524.174608] EXT4-fs mount: 110 callbacks suppressed [ 524.174623] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 524.215611] EXT4-fs (loop5): re-mounted. Opts: 19:07:44 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) futimesat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) 19:07:44 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d9d}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:44 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) 19:07:44 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:07:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 19:07:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) 19:07:44 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, 0x0) 19:07:44 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) statx(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 19:07:44 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, 0x0) 19:07:44 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400001, 0x0) write$cgroup_type(r0, 0x0, 0xfffffffffffffd18) [ 524.716667] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 524.831902] device bond1128 entered promiscuous mode 19:07:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getpeername$netlink(r0, 0x0, &(0x7f0000001040)=0xffffffffffffff8a) 19:07:45 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) [ 524.858559] IPv6: ADDRCONF(NETDEV_UP): bond1128: link is not ready [ 524.879857] 8021q: adding VLAN 0 to HW filter on device bond1128 [ 524.948746] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 525.010759] EXT4-fs (loop5): re-mounted. Opts: 19:07:45 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d9e}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:45 executing program 2: pselect6(0x0, 0x0, 0x0, &(0x7f0000002480), &(0x7f00000024c0)={0x0, 0x989680}, 0x0) 19:07:45 executing program 4: openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x20000, 0x0) 19:07:45 executing program 1: get_mempolicy(&(0x7f0000000880), 0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x3) 19:07:45 executing program 0: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000300)=""/121) 19:07:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:45 executing program 4: select(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x5}, 0x0, 0x0) 19:07:45 executing program 1: mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 19:07:45 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffff9) 19:07:45 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 19:07:45 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xe0000, 0x0) [ 525.195826] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 525.221698] device bond1129 entered promiscuous mode [ 525.287528] EXT4-fs (loop5): re-mounted. Opts: 19:07:45 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19d9f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}]}) 19:07:45 executing program 2: io_setup(0x0, &(0x7f000000b4c0)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 19:07:45 executing program 4: 19:07:45 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 19:07:45 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) [ 525.470035] device bond1130 entered promiscuous mode [ 525.482365] IPv6: ADDRCONF(NETDEV_UP): bond1130: link is not ready [ 525.502072] 8021q: adding VLAN 0 to HW filter on device bond1130 [ 525.510899] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:45 executing program 0: socket(0x1, 0x0, 0x10001) 19:07:45 executing program 1: r0 = eventfd2(0x1000, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff9, 0x8) read$eventfd(r0, &(0x7f0000000040), 0x8) 19:07:45 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19da0}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 525.580552] EXT4-fs (loop5): re-mounted. Opts: 19:07:45 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000071c0)={'batadv0\x00'}) 19:07:45 executing program 4: r0 = epoll_create1(0x0) r1 = eventfd2(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000002c0)) 19:07:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}]}) 19:07:45 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x6c9202, 0x0) 19:07:45 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffa000/0x1000)=nil) 19:07:45 executing program 1: r0 = eventfd2(0x6, 0x0) read$eventfd(r0, &(0x7f0000000140), 0x8) 19:07:45 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self\x00', 0x80100, 0x0) [ 525.765274] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 525.819155] EXT4-fs (loop5): re-mounted. Opts: 19:07:46 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) [ 525.860918] device bond1131 entered promiscuous mode 19:07:46 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 19:07:46 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f000000b440)='/dev/full\x00', 0x0, 0x0) ioctl$CHAR_RAW_BSZGET(r0, 0x80081270, 0x0) 19:07:46 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 19:07:46 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19da1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_type={'obj_type', 0x3d, ','}}]}) 19:07:46 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) utimensat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 19:07:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) 19:07:46 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getpeername$unix(r0, 0x0, 0x0) 19:07:46 executing program 0: symlinkat(&(0x7f0000000800)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00') 19:07:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000280)='cpu.weight\x00', 0x2, 0x0) [ 526.064233] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:46 executing program 2: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000100)={{0x2, 0x0, 0xee00, 0xee01, 0xee00}}) [ 526.106672] EXT4-fs (loop5): re-mounted. Opts: 19:07:46 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f000000b880)='/proc/self\x00', 0x12402, 0x0) 19:07:46 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 19:07:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:46 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 526.218442] device bond1132 entered promiscuous mode [ 526.236706] IPv6: ADDRCONF(NETDEV_UP): bond1132: link is not ready [ 526.263193] 8021q: adding VLAN 0 to HW filter on device bond1132 19:07:46 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19da2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 19:07:46 executing program 0: semget$private(0x0, 0x4, 0x140) 19:07:46 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40080, 0x0) 19:07:46 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, 0x0) 19:07:46 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x208400, 0x0) [ 526.405803] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:46 executing program 0: mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:07:46 executing program 1: 19:07:46 executing program 2: [ 526.458734] device bond1133 entered promiscuous mode [ 526.473060] EXT4-fs (loop5): re-mounted. Opts: 19:07:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:46 executing program 0: 19:07:46 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19da3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:46 executing program 4: 19:07:46 executing program 1: 19:07:46 executing program 2: 19:07:46 executing program 0: [ 526.669950] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:46 executing program 4: 19:07:46 executing program 1: 19:07:46 executing program 2: 19:07:46 executing program 0: [ 526.775116] EXT4-fs (loop5): re-mounted. Opts: 19:07:47 executing program 1: [ 526.822479] device bond1134 entered promiscuous mode [ 526.838800] IPv6: ADDRCONF(NETDEV_UP): bond1134: link is not ready 19:07:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:47 executing program 2: [ 526.898872] 8021q: adding VLAN 0 to HW filter on device bond1134 19:07:47 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19da4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:47 executing program 4: 19:07:47 executing program 0: 19:07:47 executing program 1: 19:07:47 executing program 2: 19:07:47 executing program 0: 19:07:47 executing program 4: [ 527.036208] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:47 executing program 1: 19:07:47 executing program 2: [ 527.105183] EXT4-fs (loop5): re-mounted. Opts: 19:07:47 executing program 0: 19:07:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:47 executing program 2: [ 527.230132] device bond1135 entered promiscuous mode 19:07:47 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19da5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:47 executing program 1: 19:07:47 executing program 4: 19:07:47 executing program 0: 19:07:47 executing program 2: 19:07:47 executing program 1: [ 527.351135] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:47 executing program 4: 19:07:47 executing program 0: [ 527.458004] EXT4-fs (loop5): re-mounted. Opts: 19:07:47 executing program 2: 19:07:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:47 executing program 0: 19:07:47 executing program 1: [ 527.538480] device bond1136 entered promiscuous mode [ 527.543872] IPv6: ADDRCONF(NETDEV_UP): bond1136: link is not ready [ 527.641574] 8021q: adding VLAN 0 to HW filter on device bond1136 [ 527.691413] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:47 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19da6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:47 executing program 4: 19:07:47 executing program 0: 19:07:47 executing program 2: 19:07:47 executing program 1: [ 527.739241] EXT4-fs (loop5): re-mounted. Opts: 19:07:48 executing program 1: 19:07:48 executing program 4: 19:07:48 executing program 2: 19:07:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:48 executing program 0: 19:07:48 executing program 1: 19:07:48 executing program 4: [ 527.948193] device bond1137 entered promiscuous mode 19:07:48 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19da7}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:48 executing program 2: 19:07:48 executing program 1: 19:07:48 executing program 0: [ 528.002692] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 528.026334] EXT4-fs (loop5): re-mounted. Opts: 19:07:48 executing program 4: 19:07:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:48 executing program 0: 19:07:48 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005ac0)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) 19:07:48 executing program 1: 19:07:48 executing program 4: 19:07:48 executing program 0: [ 528.228041] device bond1138 entered promiscuous mode 19:07:48 executing program 1: [ 528.265849] IPv6: ADDRCONF(NETDEV_UP): bond1138: link is not ready [ 528.303034] 8021q: adding VLAN 0 to HW filter on device bond1138 19:07:48 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19da8}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:48 executing program 4: 19:07:48 executing program 2: 19:07:48 executing program 0: [ 528.339350] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:48 executing program 1: 19:07:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:48 executing program 2: 19:07:48 executing program 4: 19:07:48 executing program 0: 19:07:48 executing program 1: [ 528.523219] device bond1139 entered promiscuous mode 19:07:48 executing program 2: 19:07:48 executing program 4: 19:07:48 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19da9}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:48 executing program 0: 19:07:48 executing program 1: 19:07:48 executing program 2: [ 528.639240] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 528.698894] EXT4-fs (loop5): re-mounted. Opts: 19:07:48 executing program 4: 19:07:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:49 executing program 2: 19:07:49 executing program 0: 19:07:49 executing program 1: [ 528.824527] device bond1140 entered promiscuous mode 19:07:49 executing program 4: 19:07:49 executing program 2: [ 528.853938] IPv6: ADDRCONF(NETDEV_UP): bond1140: link is not ready [ 528.889451] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 528.893944] 8021q: adding VLAN 0 to HW filter on device bond1140 19:07:49 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19daa}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:49 executing program 0: 19:07:49 executing program 1: 19:07:49 executing program 4: 19:07:49 executing program 2: 19:07:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:49 executing program 4: 19:07:49 executing program 0: 19:07:49 executing program 1: [ 529.150952] device bond1141 entered promiscuous mode 19:07:49 executing program 4: 19:07:49 executing program 2: 19:07:49 executing program 0: [ 529.212432] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:49 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dab}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:49 executing program 4: 19:07:49 executing program 1: 19:07:49 executing program 2: 19:07:49 executing program 0: 19:07:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:49 executing program 4: 19:07:49 executing program 1: 19:07:49 executing program 2: 19:07:49 executing program 0: 19:07:49 executing program 4: 19:07:49 executing program 2: [ 529.530697] device bond1142 entered promiscuous mode [ 529.559659] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 529.567745] IPv6: ADDRCONF(NETDEV_UP): bond1142: link is not ready [ 529.608239] 8021q: adding VLAN 0 to HW filter on device bond1142 19:07:49 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dac}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:49 executing program 1: 19:07:49 executing program 4: 19:07:49 executing program 0: 19:07:49 executing program 2: 19:07:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<'}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:50 executing program 4: 19:07:50 executing program 1: 19:07:50 executing program 0: 19:07:50 executing program 2: 19:07:50 executing program 4: 19:07:50 executing program 0: [ 529.876791] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 529.924931] EXT4-fs (loop5): re-mounted. Opts: 19:07:50 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dad}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:50 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x5, &(0x7f0000000180), 0x4) 19:07:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@dstaddrv6={0x1c, 0x84, 0xa, @empty}], 0x1c}, 0x0) 19:07:50 executing program 4: select(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) 19:07:50 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r1) r3 = dup2(r2, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140), &(0x7f0000001700)=0x4) [ 529.996576] device bond1143 entered promiscuous mode 19:07:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:50 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000280)=ANY=[@ANYRESHEX], 0xe0) [ 530.193105] device bond1144 entered promiscuous mode [ 530.231762] IPv6: ADDRCONF(NETDEV_UP): bond1144: link is not ready [ 530.243937] 8021q: adding VLAN 0 to HW filter on device bond1144 19:07:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x0, 0x0, 0x0, r3}}], 0x1c}, 0x0) 19:07:50 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) [ 530.293462] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:50 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x104, &(0x7f0000000140), &(0x7f0000000240)=0x4) 19:07:50 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dae}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 530.372904] EXT4-fs (loop5): re-mounted. Opts: 19:07:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) [ 530.464768] device bond1145 entered promiscuous mode 19:07:50 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x18, &(0x7f0000000080), 0x4) 19:07:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000880)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000008c0)=@abs={0x8}, 0x8) 19:07:50 executing program 1: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000240), 0x0, 0x3fc) [ 530.584058] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 530.630107] EXT4-fs (loop5): re-mounted. Opts: 19:07:51 executing program 4: shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 19:07:51 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19daf}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:51 executing program 1: socket$inet6_udplite(0x1c, 0x2, 0x88) select(0x40, &(0x7f0000000100)={0x7}, 0x0, &(0x7f0000000180)={0x7fffffff}, &(0x7f00000001c0)={0x7ff}) 19:07:51 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0x3}, 0x1c) 19:07:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x104063, &(0x7f0000001280)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000040), 0x4000) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', 0x0, 0xb3, 0x0, &(0x7f0000000480), 0x2000, &(0x7f0000000580)={[{@space_cache_v1='space_cache=v1'}, {@enospc_debug='enospc_debug'}, {@autodefrag='autodefrag'}, {@nobarrier='nobarrier'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}], [{@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'bfs\x00'}}, {@obj_user={'obj_user', 0x3d, '\\&+%'}}]}) 19:07:51 executing program 0: setreuid(0x0, 0xffffffffffffffff) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) [ 531.027672] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:07:51 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) chroot(&(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 19:07:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20}, 0x8) [ 531.113170] EXT4-fs (loop5): re-mounted. Opts: 19:07:51 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x26, 0x0, &(0x7f0000000200)) [ 531.145354] device bond1146 entered promiscuous mode 19:07:51 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) [ 531.177132] IPv6: ADDRCONF(NETDEV_UP): bond1146: link is not ready 19:07:51 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f0000000040), &(0x7f0000000080)=0x8) [ 531.242622] 8021q: adding VLAN 0 to HW filter on device bond1146 19:07:51 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000380)) 19:07:51 executing program 5: symlinkat(&(0x7f0000000900)='./file0/file0\x00', 0xffffffffffffffff, 0x0) 19:07:51 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19db0}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:51 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) shutdown(r0, 0x0) 19:07:51 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x80, &(0x7f0000000180)={0x1c, 0x1c, 0x1}, 0x1c) 19:07:51 executing program 0: select(0x40, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)) 19:07:51 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x1ff, 0x0, 0x20}, 0x10) 19:07:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 19:07:51 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19db1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:51 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) chroot(0x0) 19:07:51 executing program 4: open$dir(&(0x7f0000000940)='./file0/file0\x00', 0x0, 0x0) 19:07:51 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001a40)=@in={0x10, 0x2}, 0x10) 19:07:51 executing program 2: setreuid(0x0, 0xffffffffffffffff) getresuid(&(0x7f0000000380), 0x0, &(0x7f0000000400)) 19:07:52 executing program 5: connect$unix(0xffffffffffffffff, &(0x7f00000008c0)=@abs={0x8}, 0x8) 19:07:52 executing program 0: setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x60) 19:07:52 executing program 4: recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@in={0x10, 0x2}, 0x10) [ 531.841379] device bond1147 entered promiscuous mode 19:07:52 executing program 2: r0 = socket(0x2, 0x3, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000002940)={&(0x7f00000003c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 19:07:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000000c0)='s', 0x1}], 0x1, &(0x7f0000000580)=[@dstaddrv6={0x1c, 0x84, 0xa, @loopback}, @prinfo={0x14}], 0x30}, 0x0) [ 531.874021] IPv6: ADDRCONF(NETDEV_UP): bond1147: link is not ready [ 531.900491] 8021q: adding VLAN 0 to HW filter on device bond1147 19:07:52 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000000), 0xc) 19:07:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)=0xffa0) 19:07:52 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19db2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000000)={r3, 0x2, "bc97"}, &(0x7f00000000c0)=0xa) 19:07:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x40001, 0x0, 0x0) 19:07:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000840000000a000000000000000000000008"], 0x1c}, 0x0) 19:07:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000280), 0x8) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f0000000100)=[{&(0x7f00000000c0)='s', 0x1}], 0x1, 0x0, 0x1c}, 0x0) 19:07:52 executing program 0: 19:07:52 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r1) r3 = dup2(r2, r0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x10) 19:07:52 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000011c0)=[{0x0}], 0x1, &(0x7f0000001440)=[@cred, @rights, @cred, @cred, @cred, @rights], 0x80}, 0x0) [ 532.232451] device bond1148 entered promiscuous mode 19:07:52 executing program 4: accept$unix(0xffffffffffffff9c, &(0x7f0000000100)=@abs, &(0x7f0000000140)=0x8) 19:07:52 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0xc, &(0x7f0000000040)) 19:07:52 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000000040), &(0x7f0000000100)=0x18) 19:07:52 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19db3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:52 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0x3}, 0x1c) 19:07:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000880)={0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x10040) 19:07:52 executing program 1: select(0x40, &(0x7f0000000100)={0x7}, 0x0, 0x0, &(0x7f00000001c0)={0x7ff}) 19:07:52 executing program 4: socket$inet6(0x1c, 0x0, 0x0) [ 532.465117] device bond1149 entered promiscuous mode 19:07:52 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 19:07:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x100, 0x0, &(0x7f0000000400)) [ 532.490271] IPv6: ADDRCONF(NETDEV_UP): bond1149: link is not ready 19:07:52 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) 19:07:52 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f00000000c0)={0x0, 0x2, "0470"}, &(0x7f0000001100)=0xa) 19:07:52 executing program 4: accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000001040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000880)) [ 532.559378] 8021q: adding VLAN 0 to HW filter on device bond1149 19:07:52 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19db4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:52 executing program 5: select(0x40, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), 0x0) 19:07:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:07:52 executing program 0: fchdir(0xffffffffffffff9c) 19:07:52 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c}, 0x1c) 19:07:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000000c0)='s', 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000840000000a000000000000000000000000000000f5"], 0x1c}, 0x0) 19:07:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x2000, 0x0, 0x0, r3}}], 0x1c}, 0x0) [ 532.811378] device bond1150 entered promiscuous mode 19:07:53 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19db5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:53 executing program 4: socket$inet6_udplite(0x1c, 0x2, 0x88) select(0x40, &(0x7f0000000100)={0x7}, &(0x7f0000000140), &(0x7f0000000180)={0x7fffffff}, &(0x7f00000001c0)={0x7ff}) 19:07:53 executing program 2: setrlimit(0x0, &(0x7f00000002c0)) 19:07:53 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000000), 0x80) [ 532.984517] device bond1151 entered promiscuous mode 19:07:53 executing program 2: select(0x40, &(0x7f0000000100)={0x7}, &(0x7f0000000140), &(0x7f0000000180), 0x0) 19:07:53 executing program 4: semop(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000880)) [ 533.005683] IPv6: ADDRCONF(NETDEV_UP): bond1151: link is not ready [ 533.056895] 8021q: adding VLAN 0 to HW filter on device bond1151 19:07:53 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x4, &(0x7f0000000240), 0x4) 19:07:53 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000240), 0x8) 19:07:53 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r0, r1) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x1c, 0x1c, 0x3}, 0x1c) 19:07:53 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19db6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:53 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x10, &(0x7f00000002c0)=0x5, 0x4) 19:07:53 executing program 1: getresuid(&(0x7f0000000380), 0x0, 0x0) 19:07:53 executing program 1: fcntl$lock(0xffffffffffffff9c, 0xb, 0x0) 19:07:53 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) recvfrom$inet(r1, 0x0, 0x0, 0xc3, 0x0, 0x0) 19:07:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000000c0)='s', 0x1}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000840000000a000000000069"], 0x1c}, 0x0) 19:07:53 executing program 2: linkat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) [ 533.792676] device bond1152 entered promiscuous mode 19:07:54 executing program 1: select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x7fffffff}, 0x0) 19:07:54 executing program 5: 19:07:54 executing program 0: 19:07:54 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19db7}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:54 executing program 2: 19:07:54 executing program 4: 19:07:54 executing program 1: 19:07:54 executing program 5: 19:07:54 executing program 2: 19:07:54 executing program 0: 19:07:54 executing program 4: 19:07:54 executing program 1: 19:07:54 executing program 2: 19:07:54 executing program 5: 19:07:54 executing program 0: [ 534.109323] device bond1153 entered promiscuous mode [ 534.162110] IPv6: ADDRCONF(NETDEV_UP): bond1153: link is not ready [ 534.178148] 8021q: adding VLAN 0 to HW filter on device bond1153 19:07:54 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19db8}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:54 executing program 4: 19:07:54 executing program 2: 19:07:54 executing program 5: 19:07:54 executing program 1: 19:07:54 executing program 0: 19:07:54 executing program 2: 19:07:54 executing program 0: 19:07:54 executing program 5: 19:07:54 executing program 4: 19:07:54 executing program 1: 19:07:54 executing program 2: [ 534.433968] device bond1154 entered promiscuous mode 19:07:54 executing program 5: 19:07:54 executing program 0: 19:07:54 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19db9}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:54 executing program 1: 19:07:54 executing program 4: 19:07:54 executing program 5: 19:07:54 executing program 2: 19:07:54 executing program 0: 19:07:54 executing program 1: 19:07:54 executing program 5: 19:07:54 executing program 4: 19:07:54 executing program 1: [ 534.664923] device bond1155 entered promiscuous mode 19:07:54 executing program 2: [ 534.687757] IPv6: ADDRCONF(NETDEV_UP): bond1155: link is not ready [ 534.721602] 8021q: adding VLAN 0 to HW filter on device bond1155 19:07:54 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dba}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:54 executing program 0: 19:07:54 executing program 5: 19:07:54 executing program 4: 19:07:54 executing program 1: 19:07:54 executing program 2: 19:07:55 executing program 4: 19:07:55 executing program 5: 19:07:55 executing program 1: 19:07:55 executing program 0: 19:07:55 executing program 2: 19:07:55 executing program 5: 19:07:55 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dbb}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:55 executing program 4: 19:07:55 executing program 1: 19:07:55 executing program 0: 19:07:55 executing program 2: 19:07:55 executing program 5: [ 534.981093] device bond1156 entered promiscuous mode 19:07:55 executing program 2: 19:07:55 executing program 5: 19:07:55 executing program 0: 19:07:55 executing program 1: 19:07:55 executing program 5: 19:07:55 executing program 4: [ 535.180423] device bond1157 entered promiscuous mode 19:07:55 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dbc}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:55 executing program 2: 19:07:55 executing program 4: 19:07:55 executing program 0: 19:07:55 executing program 5: 19:07:55 executing program 1: [ 535.219780] IPv6: ADDRCONF(NETDEV_UP): bond1157: link is not ready [ 535.228034] 8021q: adding VLAN 0 to HW filter on device bond1157 19:07:55 executing program 4: 19:07:55 executing program 2: 19:07:55 executing program 0: 19:07:55 executing program 2: 19:07:55 executing program 4: 19:07:55 executing program 0: [ 535.769616] device bond1158 entered promiscuous mode 19:07:56 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dbd}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:56 executing program 5: 19:07:56 executing program 1: 19:07:56 executing program 4: 19:07:56 executing program 2: 19:07:56 executing program 0: 19:07:56 executing program 0: 19:07:56 executing program 2: 19:07:56 executing program 5: 19:07:56 executing program 1: 19:07:56 executing program 4: [ 535.963451] device bond1159 entered promiscuous mode 19:07:56 executing program 2: [ 536.038466] IPv6: ADDRCONF(NETDEV_UP): bond1159: link is not ready [ 536.058494] 8021q: adding VLAN 0 to HW filter on device bond1159 19:07:56 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dbe}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:56 executing program 0: 19:07:56 executing program 5: 19:07:56 executing program 1: 19:07:56 executing program 4: 19:07:56 executing program 2: 19:07:56 executing program 1: 19:07:56 executing program 2: 19:07:56 executing program 4: 19:07:56 executing program 0: 19:07:56 executing program 1: 19:07:56 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/252, 0xfc}], 0x1}, 0x4020) sendmmsg$sock(r0, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 536.400402] device bond1160 entered promiscuous mode 19:07:56 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dbf}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:56 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000001a40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@txtime={{0x18}}], 0x18}}], 0x2, 0x0) 19:07:56 executing program 0: timer_create(0x0, &(0x7f00000001c0)={0x0, 0x0, 0xa03bf5fc1a81fe86}, 0x0) 19:07:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x5}, {}, {}, {}, {}]}) 19:07:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000001c0)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) 19:07:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, &(0x7f0000000040)=@in={0x2, 0x0, @empty}, 0x80) 19:07:56 executing program 2: add_key$user(&(0x7f0000000040)='user\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0) 19:07:56 executing program 5: r0 = socket(0xa, 0x3, 0x9) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 19:07:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x5, &(0x7f0000000200)=@raw=[@alu, @exit, @func, @exit, @generic], &(0x7f0000000240)='GPL\x00', 0x0, 0xe3, &(0x7f0000000280)=""/227, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0), 0x10}, 0x25) 19:07:56 executing program 4: r0 = socket(0xa, 0x3, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 19:07:56 executing program 5: socket(0x2, 0x0, 0xffffff01) [ 536.603706] device bond1161 entered promiscuous mode 19:07:56 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000280)={'bond0\x00', @ifru_data=0x0}) [ 536.663734] IPv6: ADDRCONF(NETDEV_UP): bond1161: link is not ready [ 536.677371] 8021q: adding VLAN 0 to HW filter on device bond1161 19:07:56 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dc0}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:56 executing program 4: getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000100)) madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x10) 19:07:56 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$sock(r0, &(0x7f0000001640)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000001500)=[{&(0x7f0000000100)="e7014f2f", 0x4}], 0x1}}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/189, 0xbd}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 19:07:56 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) mlock(&(0x7f0000004000/0x2000)=nil, 0x2000) mlock(&(0x7f0000001000/0x3000)=nil, 0x3000) 19:07:57 executing program 1: setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x63e0bb14d3d6dabd) 19:07:57 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) 19:07:57 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000001c0)=0x20000) 19:07:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) 19:07:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a92e000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit'}}]}) 19:07:57 executing program 1: syz_mount_image$nilfs2(&(0x7f0000000040)='nilfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x2ad, 0x0, &(0x7f00000002c0), 0x800043, &(0x7f0000000300)={[{@order_strict='order=strict'}]}) [ 536.908112] device bond1162 entered promiscuous mode 19:07:57 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) 19:07:57 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dc1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 536.987279] ================================================================================ [ 536.996204] UBSAN: Undefined behaviour in fs/ext4/super.c:3763:25 [ 537.002439] shift exponent 46 is too large for 32-bit type 'int' [ 537.008588] CPU: 0 PID: 15823 Comm: syz-executor.5 Not tainted 4.19.152-syzkaller #0 [ 537.016464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.019934] NILFS (loop1): unable to read superblock [ 537.025821] Call Trace: [ 537.025896] dump_stack+0x22c/0x33e 19:07:57 executing program 2: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000000)={'xfrm0\x00', @ifru_flags}) [ 537.025985] ubsan_epilogue+0xe/0x3a [ 537.040973] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 537.047200] ? btrfs_alloc_reserved_file_extent+0x14/0x1d0 [ 537.052912] ext4_fill_super.cold+0x33b/0x4ea [ 537.057454] ? vsnprintf+0x2cc/0x14f0 [ 537.061268] ? pointer+0x850/0x850 [ 537.064859] ? lock_downgrade+0x750/0x750 [ 537.069015] ? ext4_calculate_overhead+0x12f0/0x12f0 [ 537.074126] ? snprintf+0xbb/0xf0 [ 537.077573] ? vsprintf+0x30/0x30 [ 537.081009] ? __mutex_add_waiter+0x160/0x160 [ 537.085540] ? set_blocksize+0x163/0x3f0 [ 537.089655] mount_bdev+0x2fc/0x3b0 [ 537.093302] ? ext4_calculate_overhead+0x12f0/0x12f0 [ 537.098432] mount_fs+0xa3/0x318 [ 537.101794] vfs_kern_mount.part.0+0x68/0x470 [ 537.106415] do_mount+0x51c/0x2f10 [ 537.109986] ? check_preemption_disabled+0x41/0x2b0 [ 537.114999] ? copy_mount_string+0x40/0x40 [ 537.119295] ? kmem_cache_alloc_trace+0x376/0x4a0 [ 537.124188] ? _copy_from_user+0xd2/0x130 [ 537.128340] ? copy_mount_options+0x261/0x370 [ 537.132839] ksys_mount+0xcf/0x130 [ 537.136363] __x64_sys_mount+0xba/0x150 [ 537.140320] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 537.144912] do_syscall_64+0xf9/0x670 [ 537.148714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.153890] RIP: 0033:0x4608aa [ 537.157076] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 537.176074] RSP: 002b:00007f3a912ada88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 537.183779] RAX: ffffffffffffffda RBX: 00007f3a912adb20 RCX: 00000000004608aa [ 537.191039] RDX: 0000000020000080 RSI: 0000000020000280 RDI: 00007f3a912adae0 [ 537.198296] RBP: 00007f3a912adae0 R08: 00007f3a912adb20 R09: 0000000020000080 [ 537.205555] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 537.212818] R13: 0000000020000280 R14: 0000000020000040 R15: 0000000020000240 [ 537.220076] ================================================================================ [ 537.230246] EXT4-fs (loop5): Unsupported filesystem blocksize 16777216 (46 log_block_size) 19:07:57 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002740)=""/4096, 0x1000}, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmmsg$sock(r0, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x400000000000245, 0x0) [ 537.289126] device bond1163 entered promiscuous mode [ 537.298392] IPv6: ADDRCONF(NETDEV_UP): bond1163: link is not ready [ 537.304809] 8021q: adding VLAN 0 to HW filter on device bond1163 19:07:57 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dc2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa0111000, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0x5, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) [ 537.336665] NILFS (loop1): unable to read superblock 19:07:57 executing program 1: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='-rom1fs-\x00\x00)', 0xb}], 0x0, &(0x7f0000000240)=ANY=[]) [ 537.378907] device bond1164 entered promiscuous mode [ 537.394751] EXT4-fs (loop5): Unsupported filesystem blocksize 16777216 (46 log_block_size) 19:07:57 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dc3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:07:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) [ 537.447342] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 19:07:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x146}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:07:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 19:07:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x13d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 537.581272] device bond1165 entered promiscuous mode [ 537.587003] IPv6: ADDRCONF(NETDEV_UP): bond1165: link is not ready [ 537.589093] MTD: Attempt to mount non-MTD device "/dev/loop1" [ 537.593514] 8021q: adding VLAN 0 to HW filter on device bond1165 19:07:57 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dc4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 537.636435] romfs: bad initial checksum on dev loop1. 19:07:57 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dc5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 537.702036] device bond1166 entered promiscuous mode [ 537.713361] MTD: Attempt to mount non-MTD device "/dev/loop1" [ 537.735080] romfs: bad initial checksum on dev loop1. 19:07:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) 19:07:58 executing program 1: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='-rom1fs-\x00\x00)', 0xb}], 0x0, &(0x7f0000000240)=ANY=[]) 19:07:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) 19:07:58 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dc6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 537.872075] MTD: Attempt to mount non-MTD device "/dev/loop1" [ 537.879092] romfs: bad initial checksum on dev loop1. [ 537.888668] device bond1167 entered promiscuous mode [ 537.894047] IPv6: ADDRCONF(NETDEV_UP): bond1167: link is not ready [ 537.902936] 8021q: adding VLAN 0 to HW filter on device bond1167 19:07:58 executing program 1: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='-rom1fs-\x00\x00)', 0xb}], 0x0, &(0x7f0000000240)=ANY=[]) 19:07:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) 19:07:58 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dc7}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 538.054492] device bond1168 entered promiscuous mode [ 538.074421] MTD: Attempt to mount non-MTD device "/dev/loop1" [ 538.080987] romfs: bad initial checksum on dev loop1. [ 538.217239] device bond1169 entered promiscuous mode [ 538.222631] IPv6: ADDRCONF(NETDEV_UP): bond1169: link is not ready [ 538.229548] 8021q: adding VLAN 0 to HW filter on device bond1169 19:08:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$adfs(&(0x7f00000000c0)='adfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="028b894289bf1729864b438ef4ef999d362fccbed6b5dd2f37f5191f89ad685b676f02a9a8a3ec18c18df8253a170255db7e0d75135c1338", 0x38, 0xbc9}], 0x0, &(0x7f0000000640)) 19:08:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c6138b7c754ff41c5d3cd1b6eabd323eb69bf5ec29954197b5564e6ac851909cf99421f46b04fff0c935433e6691f8b25bee7df03b08db40ba73ac381dd4dea5dac863b5e2e3300bbd04055fff98a5c92c4b0b0deb44d872aa7bb025d0118d0e12363949f0f52917f95dc079f7c82a8e9eb1c1c840ec3dc93d87be6f6ed2195e8083b0c00ade4a74bd32932f9671a6ec9642e8a4fb6f987dbfeb3ffa2bee7909330daebfb1da08dc6bb6f2996bca3f9f4b274946420d43ce7a7915180e87d140b67c29d2fd4273018e03d536d4618f45e57d92c10f7967786ee63a7fe157c04f5", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 19:08:00 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000140)={'gretap0\x00'}) socketpair(0x1, 0x2, 0x0, &(0x7f00000004c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x4, 0x24, 0x0, 0x0, 0x0, 0x0, 0x208a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xeed}, 0x0, 0x0, 0x1, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 19:08:00 executing program 1: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='-rom1fs-\x00\x00)', 0xb}], 0x0, &(0x7f0000000240)=ANY=[]) 19:08:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) 19:08:00 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dc8}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 540.603643] VFS: Can't find an adfs filesystem on dev loop2. 19:08:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$adfs(&(0x7f00000000c0)='adfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="028b894289bf1729864b438ef4ef999d362fccbed6b5dd2f37f5191f89ad685b676f02a9a8a3ec18c18df8253a170255db7e0d75135c1338", 0x38, 0xbc9}], 0x0, &(0x7f0000000640)) 19:08:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) 19:08:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) 19:08:01 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dc9}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:08:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv4_delrule={0x1c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}}, 0x1c}}, 0x0) [ 540.764853] MTD: Attempt to mount non-MTD device "/dev/loop1" [ 540.791572] device bond1170 entered promiscuous mode [ 540.805456] romfs: bad initial checksum on dev loop1. 19:08:01 executing program 1: syz_mount_image$romfs(0x0, &(0x7f0000000100)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='-rom1fs-\x00\x00)', 0xb}], 0x0, &(0x7f0000000240)=ANY=[]) [ 540.878780] VFS: Can't find an adfs filesystem on dev loop2. [ 540.951992] device bond1171 entered promiscuous mode [ 540.958002] IPv6: ADDRCONF(NETDEV_UP): bond1171: link is not ready [ 540.964322] 8021q: adding VLAN 0 to HW filter on device bond1171 19:08:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setrlimit(0x6, &(0x7f0000000140)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 19:08:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 19:08:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$adfs(&(0x7f00000000c0)='adfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="028b894289bf1729864b438ef4ef999d362fccbed6b5dd2f37f5191f89ad685b676f02a9a8a3ec18c18df8253a170255db7e0d75135c1338", 0x38, 0xbc9}], 0x0, &(0x7f0000000640)) 19:08:03 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dca}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:08:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) 19:08:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) 19:08:03 executing program 1: syz_mount_image$romfs(0x0, &(0x7f0000000100)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='-rom1fs-\x00\x00)', 0xb}], 0x0, &(0x7f0000000240)=ANY=[]) [ 543.783925] device bond1172 entered promiscuous mode 19:08:04 executing program 1: syz_mount_image$romfs(0x0, &(0x7f0000000100)='./file0\x00', 0x200000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='-rom1fs-\x00\x00)', 0xb}], 0x0, &(0x7f0000000240)=ANY=[]) 19:08:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) 19:08:04 executing program 4: clone(0x20020046bfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) 19:08:04 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dcb}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:08:04 executing program 4: pipe2(&(0x7f0000000d40)={0xffffffffffffffff}, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) [ 543.914978] VFS: Can't find an adfs filesystem on dev loop2. 19:08:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$adfs(&(0x7f00000000c0)='adfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="028b894289bf1729864b438ef4ef999d362fccbed6b5dd2f37f5191f89ad685b676f02a9a8a3ec18c18df8253a170255db7e0d75135c1338", 0x38, 0xbc9}], 0x0, &(0x7f0000000640)) [ 544.002482] device bond1173 entered promiscuous mode [ 544.019458] IPv6: ADDRCONF(NETDEV_UP): bond1173: link is not ready [ 544.039137] 8021q: adding VLAN 0 to HW filter on device bond1173 [ 544.128579] VFS: Can't find an adfs filesystem on dev loop2. 19:08:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 19:08:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001300290a000000000000000007000000", @ANYRES32=r1], 0x28}}, 0x0) 19:08:06 executing program 1: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', 0x0, 0x200000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='-rom1fs-\x00\x00)', 0xb}], 0x0, &(0x7f0000000240)=ANY=[]) 19:08:06 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dcc}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:08:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000020006e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) 19:08:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) syz_mount_image$adfs(&(0x7f00000000c0)='adfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="028b894289bf1729864b438ef4ef999d362fccbed6b5dd2f37f5191f89ad685b676f02a9a8a3ec18c18df8253a170255db7e0d75135c1338", 0x38, 0xbc9}], 0x0, &(0x7f0000000640)) 19:08:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]}) [ 546.862689] VFS: Can't find an adfs filesystem on dev loop2. [ 546.880225] device bond1174 entered promiscuous mode 19:08:07 executing program 1: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', 0x0, 0x200000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='-rom1fs-\x00\x00)', 0xb}], 0x0, &(0x7f0000000240)=ANY=[]) 19:08:07 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19dcd}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 19:08:07 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x165000, 0x0) 19:08:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) syz_mount_image$adfs(&(0x7f00000000c0)='adfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="028b894289bf1729864b438ef4ef999d362fccbed6b5dd2f37f5191f89ad685b676f02a9a8a3ec18c18df8253a170255db7e0d75135c1338", 0x38, 0xbc9}], 0x0, &(0x7f0000000640)) 19:08:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x1400000000000000}}]})