)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:53 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x1200}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:53 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x1400}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/sockcreate\x00') setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0xe1d53e5ccc0127c7, 0x0) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e24, @multicast1}, 0x10) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:53 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x2000}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 108.219239][ C0] sd 0:0:1:0: tag#5788 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 108.229136][ C0] sd 0:0:1:0: tag#5788 CDB: opcode=0xe5 (vendor) [ 108.235494][ C0] sd 0:0:1:0: tag#5788 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.244543][ C0] sd 0:0:1:0: tag#5788 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.253596][ C0] sd 0:0:1:0: tag#5788 CDB[20]: ba 10:08:53 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x4}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:53 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:53 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 108.321678][ C1] sd 0:0:1:0: tag#5789 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 108.331580][ C1] sd 0:0:1:0: tag#5789 CDB: opcode=0xe5 (vendor) [ 108.337933][ C1] sd 0:0:1:0: tag#5789 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.346982][ C1] sd 0:0:1:0: tag#5789 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.356036][ C1] sd 0:0:1:0: tag#5789 CDB[20]: ba [ 108.399760][ C0] sd 0:0:1:0: tag#5790 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 108.409610][ C0] sd 0:0:1:0: tag#5790 CDB: opcode=0xe5 (vendor) [ 108.415983][ C0] sd 0:0:1:0: tag#5790 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.425040][ C0] sd 0:0:1:0: tag#5790 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.434106][ C0] sd 0:0:1:0: tag#5790 CDB[20]: ba 10:08:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x10001, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}, 0x9}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$sock_ifreq(r0, 0x8917, &(0x7f0000000000)={'veth0_macvtap\x00', @ifru_addrs=@can}) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x9d00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x300, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x28}}}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x8101) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socket$inet6(0xa, 0x5, 0x7) setsockopt$sock_int(r4, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r6, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r7, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r6, &(0x7f0000000000)='./file0\x00', 0x0) sendto$inet6(r7, &(0x7f0000000300)="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", 0x1000, 0x4008000, &(0x7f00000000c0)={0xa, 0x4e22, 0x1, @remote, 0xe24}, 0x1c) preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x5}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f00000001c0)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="81c2389e8860af89ded4897e54c5b8c0ec059a9fc079763b651496d450bda7fc248363ca20e7db7d697bccbf91673e51ed56fffaf86e2a234e7be848cc9391f8da1fb6d9420f878973e8c3cb52e57bf86da6abf5c72f", 0x56, 0x40, &(0x7f0000000140)={0xa, 0x4e24, 0x8, @loopback, 0xff}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) [ 108.955615][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 109.004183][ C0] sd 0:0:1:0: tag#5791 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 109.008956][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 109.014215][ C0] sd 0:0:1:0: tag#5791 CDB: opcode=0xe5 (vendor) [ 109.031556][ C0] sd 0:0:1:0: tag#5791 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 109.040614][ C0] sd 0:0:1:0: tag#5791 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 109.049657][ C0] sd 0:0:1:0: tag#5791 CDB[20]: ba 10:08:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 109.056075][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 109.121743][ C1] sd 0:0:1:0: tag#5792 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 109.131615][ C1] sd 0:0:1:0: tag#5792 CDB: opcode=0xe5 (vendor) [ 109.137966][ C1] sd 0:0:1:0: tag#5792 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 109.147022][ C1] sd 0:0:1:0: tag#5792 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 109.156087][ C1] sd 0:0:1:0: tag#5792 CDB[20]: ba 10:08:54 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="84000000", @ANYRES16=r3, @ANYBLOB="000327bd7000fcdbdf251400000005001301010000000500740001000000050029000a000000050029000a0000000a0006000802110000000000210013000c01120192180b8c36848609b0369836ec6c925a1cf55c583c9079469ebd31820bec060330858be08300000006003600010400000600ab000104000006001000fb0500000600ed00b1020000"], 0x84}, 0x1, 0x0, 0x0, 0x4040000}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r4, 0x80) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r5, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000340)="c3ac849209f8c32b0e9b2c5e37aeaa36", 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x14, 0x0, 0x1, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000580)={0xc8, 0x0, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0xfffffffffffffe22, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x15}, 0x800) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:54 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x7}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x400501, 0x4d4e5105fec3ea96) mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x110) renameat2(r4, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000000)='./file0\x00', 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23, 0x8, @remote, 0x2}, 0x1c) 10:08:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f000031e000)={0xa, 0x4e21, 0x0, @remote, 0x6}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x3}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x0) accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000100)=0x1c, 0x81400) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4ea6, 0xffffffff, @loopback, 0x3}, 0x1c) listen(r0, 0x80) connect(r2, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x0, 0x0, 0x3, {0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:54 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 109.261175][ C1] sd 0:0:1:0: tag#5793 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 109.271059][ C1] sd 0:0:1:0: tag#5793 CDB: opcode=0xe5 (vendor) [ 109.277410][ C1] sd 0:0:1:0: tag#5793 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 109.286457][ C1] sd 0:0:1:0: tag#5793 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 109.295515][ C1] sd 0:0:1:0: tag#5793 CDB[20]: ba 10:08:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x8}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x4}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) [ 109.389659][ C1] sd 0:0:1:0: tag#5794 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 109.399526][ C1] sd 0:0:1:0: tag#5794 CDB: opcode=0xe5 (vendor) [ 109.405904][ C1] sd 0:0:1:0: tag#5794 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 109.414945][ C1] sd 0:0:1:0: tag#5794 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 109.423991][ C1] sd 0:0:1:0: tag#5794 CDB[20]: ba [ 109.449419][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 109.543706][ C1] sd 0:0:1:0: tag#5795 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 109.553554][ C1] sd 0:0:1:0: tag#5795 CDB: opcode=0xe5 (vendor) [ 109.559898][ C1] sd 0:0:1:0: tag#5795 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 109.568947][ C1] sd 0:0:1:0: tag#5795 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 109.577979][ C1] sd 0:0:1:0: tag#5795 CDB[20]: ba 10:08:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x5}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x9}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f00000000c0)=0x4, 0x4) 10:08:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x100, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7fffffff}, 0x1c) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x989680}, 0x1, 0x1}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r3, 0x681, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r3, 0x2ff, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) connect(r6, &(0x7f0000000240)=@l2tp={0x2, 0x0, @remote, 0x2}, 0x80) 10:08:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @private1}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') socket$inet6(0xa, 0x3, 0x3) preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x7}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xb}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x8}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xc}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000180), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='net/bnep\x00') preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/155, 0x9b}], 0x1, 0xea, 0x0) 10:08:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x5e23, 0x400, @loopback}, 0x1c) listen(r0, 0x80) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:54 executing program 0: fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=@md5={0x1, "299b09ea6a04f13c4e148fceff43bb3f"}, 0x11, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x9}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xd}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7, @empty, 0x7fff}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x70bd2d, 0x0, 0xa}}, 0xf0}}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x13c}}, 0x0) shutdown(r3, 0x1) 10:08:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x81) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x40007, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), r2) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x2001, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000340), 0x4) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 10:08:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:55 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xe}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 109.943156][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:08:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xb}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) connect(r1, &(0x7f00000000c0)=@can, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:55 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x10}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xc}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 110.049529][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:08:55 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 110.140637][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:08:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xd}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e23, 0x200, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x101}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x11}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:55 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002340)=[{{&(0x7f0000000400)=@abs, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000480)=""/255, 0xff}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/14, 0xe}], 0x3}}, {{&(0x7f0000001600), 0x6e, &(0x7f0000001840)=[{&(0x7f0000001680)=""/9, 0x9}, {&(0x7f0000000280)=""/258, 0x102}, {&(0x7f00000017c0)=""/111, 0x6f}], 0x3, &(0x7f0000001880)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000018c0)=""/103, 0x67}, {&(0x7f00000016c0)=""/114, 0x72}, {&(0x7f00000019c0)=""/224, 0xe0}, {&(0x7f0000001ac0)=""/203, 0xcb}], 0x4, &(0x7f0000001c00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001c40)}, {&(0x7f0000001c80)=""/139, 0x8b}], 0x2, &(0x7f0000001d80)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x90}}, {{&(0x7f0000001e40), 0x6e, &(0x7f0000002000)=[{&(0x7f0000001ec0)=""/50, 0x32}, {&(0x7f0000001f00)=""/227, 0xe3}, {&(0x7f0000002580)=""/4096, 0x1000}], 0x3, &(0x7f0000002040)}}, {{&(0x7f0000002080), 0x6e, &(0x7f0000002280)=[{&(0x7f0000002100)=""/190, 0xbe}, {&(0x7f00000021c0)=""/131, 0x83}], 0x2, &(0x7f00000022c0)}}], 0x6, 0x0, &(0x7f00000024c0)={0x77359400}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240), 0x4) bind$inet6(r1, &(0x7f0000002500)={0xa, 0x4e22, 0x1, @mcast1, 0x3}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000001c0)={[0x101]}, 0x8) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x1, @loopback}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c010000100013070000000000000000fe8800000000000000000000000000017f000001000000000000f000000000000000000000000000000000000000000405e13d86a3723bef88db89c2ceb32b781026911c6fdd488c3a023b72236c2da9169e1731e07679575c3c33a2363083a15b8f647696c3ca35f157fcb37537694e521f958cb73b4de4b089c47ac0217f79c78f4b2bd0", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000fe88000000000004000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000049000200656362286369706865725f6e756c6c290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000042000000"], 0x13c}}, 0x0) accept4(r1, &(0x7f00000000c0)=@generic, &(0x7f0000000140)=0x80, 0x80000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:55 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xe}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 110.785654][T12362] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. 10:08:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x10}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x14}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:55 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={@local, @mcast1, @remote, 0x4, 0xd31, 0x8, 0x400, 0x98, 0x1}) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) [ 110.887602][T12379] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. 10:08:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x6, 0x403) r2 = io_uring_setup(0x3183, &(0x7f0000000300)={0x0, 0x8888, 0x4, 0x2, 0x65, 0x0, r1}) io_uring_setup(0x79e4, &(0x7f0000000400)={0x0, 0xd46f, 0x8, 0x3, 0x6d, 0x0, r2}) accept$unix(r1, &(0x7f0000000100), &(0x7f0000000180)=0x6e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @mcast1, 0x20000}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'vcan0\x00', {0x2, 0x0, @multicast1}}) 10:08:56 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x11}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:56 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 110.982347][T12393] EXT4-fs: 21 callbacks suppressed [ 110.982369][T12393] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 111.060951][T12408] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:08:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x111041, 0xa8) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x6, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x85}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20040050, &(0x7f000031e000)={0xa, 0x4e22, 0xfffffffc, @rand_addr=' \x01\x00', 0x4}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:56 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e20, 0x0, @local}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:56 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x300}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x480002, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000000)='virt_wifi0\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x24000414}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0200000057d1156860eaf3a1ca64be4e29ffc48a1a4b2adbab7ad8b40447323fad99c58e5dfa0afda153828a31c989e1d30d5cc7c7fbc27ccfba8f88186be01ced628137515d", @ANYRES16=0x0, @ANYBLOB="04002abc5900fedb4ad6ef2a714eeedf2502000000"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x400c815) 10:08:56 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x14}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 111.759898][T12427] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:08:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x7fffffff, @mcast2, 0xff}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x108000) listen(r2, 0x1f) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:56 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, 0x0, &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:56 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x9d}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x500}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000100)="a1e230b6", 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x74) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000004500)={0x0, @tipc=@id={0x1e, 0x3, 0x2, {0x4e20, 0x3}}, @rc={0x1f, @none, 0x1}, @xdp={0x2c, 0x0, 0x0, 0xc}, 0xfc01, 0x0, 0x0, 0x0, 0x200, &(0x7f00000044c0)='geneve0\x00', 0x4, 0x2, 0x3}) sendmmsg$inet6(r0, &(0x7f0000004e00)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x3, @local, 0x2bf6}, 0x1c, &(0x7f00000027c0)=[{&(0x7f0000000100)="55dc3e13e9e1e341df86d529a9e95f42139b647075f462a3a1e1a69261316f4bcf961a475e4bb3c68261a7677f49cc9f2992b056a35ec21d497e97cd233459292f5edb78d929049d3377fcb3d72499f2c193c526509cb2cea91fe6bfc3fd819317728efea9f414eb1a36b49b68b33e9d73264b3925131ecc84db086d63dc3b112e8f60cdef3e2e4f573fe52b6e1eea", 0x8f}, {&(0x7f0000000300)="265a59ed29497a695829e23b60ac5802da8c651664835110d417d2a9a5e862f615a8d790dfb721d3105258302dcfedd997e3985b91c204cee5f6abe3b0cb0abb8f3d5878cb47d1b94c80b4c5ead34dbb82b6ad2ebb440745558c618800", 0x5d}, {&(0x7f0000000380)="e1322716d58a6598e4c3802a55a6bd51f5047ca1e1a99d2f64f3d86721e22ad65d3b4ca6dd44edca4a67097b81b708f92fad824eccf645a3d6b204961d7033ed4973d7263abdddfc2e6b48b01282db33062c63e26de9dd29db1d5459bf0ef9622a8fb0a288a75eebf879ad9f11f8", 0x6e}, {&(0x7f0000000400)="532c2fb2c9dba5518e009e938287666ddedbc261bba8014e44bafb386572d75b5ef01f3d52f91a75251dadebe1171046c80a063de671f64d0fd3f502853e881d6b2a7a1b8e0ce2dc112dec832f5b7c45bfc9504e4bc232c29a2ebb97d1f5159fc319f68263ddbc618c75fbb7b0defaf7b93b7dead228ff3ff93271cf7731ae810f99e72a1a549411cfa525f661d6dd42b6e784ca", 0x94}, {&(0x7f00000004c0)="2919793d7dab90f3a9190b3b0e067f16848979abb8ce6e18e86c89df7af1e0bd4710a019d4529ebdadbd3fd290863bd31005382c32ca0fcb11b29355828529a80b375492a0a31ff187b9247dfe25cec512dccb6bf32d0e9c58d8906b5d6147ee7648a766e915eb3776137193e3672d3314a1630de12493349b09488fd353aa8138b2c06fe96218a2adcb2a8f88e41d5068cd8d869a61f8222dffbcb33d86d091e8995976d61b3ff2881ff20fa4705d6ea924346ce7c31804ae6d08dd49c5adf3a2a00fae809aa2e97beeb4de3c688276ce2b4d6d580af8414ec4d638c2063fe52ac568b00ce6", 0xe6}, {&(0x7f00000005c0)="e6f86acc42110e2aae171c56a8d45809dafcc331a583acbef30b05d14e64b16aa8cd4c071cff2ffdfbc21f25e0a2a69b80aaebf230da8f69dcbaa67ba6a805fb80c71aa27fc0c6b4f3f350e4de0d2dfa06350b1961408753c4ca23ff80859281bfe04f9a89cb7e356cc0543e68110023afd0fa0864beb38993072012b17f03a1d4797115fb90ace14fafc94913eb4973c2ba4ed8d031789a1e1ce4c4ea1dc2e11d58148518f781333c49dedf1d50621584f1654d66e14bbbb07da0087695fe4e91e12a9d1aafabaf", 0xc8}, {&(0x7f00000006c0)="85cf7d6a8238c27bb6025c56e857c34565b7edad58db9dbaa6246bfe81a23ea23008010fc857b0159ae569d0bb882685d3cae1549f3fe4148bbc21b50b4772549223f68607d3ed35513e385e1dfea319a29430f1c3345418513e8860beebe08e352dcbaa7033f91c98c94ec1c92cb759f11bf54169b5762d4ecfed3b1cded7715759a19fbf37fdb2ecca7effbfe664c3c7168d8e3d94ee60256df65157f9e9c084d65ec8486943ab3df570f497aeaa3d00ce5cba1a2eeadf00877a423c023ec0ef80c9676f2ab4f462f5b8d8bc8169831be7d09806b3944bd513a4417ed24a4faed4b52f757573db9aafc003b887cee981fe0ed81b3a02f08a1b2cf328861b71ce1712edd7defc3f8ce50926f357a3dc2e7107f37ef3cca5e2e43571f74b65a569f8eb88b6a06a700e51a5a3b04212280549aaaedbf3e639f9b736d19e490fc1e6cbed0f535cf2229a5b4d0a4e65be486fd1157ea6fae292a6aeace283516a8bddbb99de5ecc119dddff312a01ce9a6129d7174798251135841a401cec17990f63e95c430640ee39348db51701848fe35797986a86b7a2caf4fed9a9aed703ba6b9c6e966839581f06a91ab44563ffbb0fe987c87016b64ac73c246def5acecf1da275f83bc41adc10db17e41ff6a9b9669786c5e83744577322bb6dcbb0d24e622814cb9f3cbeaeac159bf70648f54acf346637ee56c40d65652df66f78dc0c5292ff3287eb340a5449ceb58630a72d224d1ab3c25150123b1d91eb76a320edef19ba7ab63841a476135dcf8f1430298f87bbcda60fb5ef8806d3d8e0fa20f24556acbf33cc58339fda03f1821cea18377bca3ca03587903d4a07fd47427e4318ec3b98b668759994030495394796d042ca68f2bafb86b8c148fdb2cd3f70cb692ae6e09e493aac1beeeafca5139c6dda453efc83ea5479f55642c05e73d821064d1ea03d74edf3092c5df6a751f1a64f9c8d32cabd52aa5d8e0ad99f25f234e9db93f8fb69324e1416feee99a7b3bfeb12e4deadb2f169acfd1733c3f7670013083745fde6e93122f2227b542f739a64efb751608d9de41ca267f3f0f0097a212dfdafa132010202d559c5a419b5dcdbaf4d196171ca3592cf8c0ab7c5f197aeecb589de7745b208f4f54e6ddf273bd4c0b2c02d4b8417b81a55dba2da63defd45b6304219ea4f9f49098b60aee4a1f1542ec7fa36bde34fcbce2c789d8db82f4a69a11a9d7513754671fb54eb1eacb41fe0b98b820e587ec974fce09eec00c82e521f92246c950a67ecaef4e068761513d9c1d48482346352c08945b4d48338c7559158760defd4436091261cbc48f31cccc59b200694a2b60fe04712ddce61e97becfedc5b30a98eb90ba739861c0b01222b1d0d9fb7685533eb0633b717a84756ea1e9ceb26f7611418b852dabf97ac72bdfca0b1de2ffb9bd05357eadf36d386208bb8aca38d3756ac56efab1963a9f66ec5577cc83f2742491f72e9d37f50a788dd7b4edb10aab3ab01607f582e34b29ec122ceb9d5c361c0fe3f2d8964e98b51fdecfa302c53115b2398253313637ca58707274fb4cc3f79033cbb3634f086b5b32e40112c1d81555d20cbb00649fe2cf26bafb0300731e79f74d80ec66e9996f2cd27846bdb99031110c87c8783fbf82e4814f49bdd3fcca915d2aeccc1d30c8e2db8220f674342a52fcc0cff0203f5c7df064a39dc40a8d3a460d4342eb5832d11b99a97a74b4928dee21f98cadb35e885941c79a741874b1805ef47f1e2c07558babba65351d8fea3a0915de644dad57315e07c3922738b9174e10db64daf32e993ba0b8df1422244fe3a7bc40651dddd630a329710f6d2492495f4f6a1f2d8f8a591df3d16dcf0d331d4e5632f553acfe4fbd827de76a2696193606679af84ab54f0abf83fb5f071d992791c3bebdf9ad016d39346024c2d12466110131dd7880a29250e92e493b91997e58209e7277e64d3e1b828391a4eb77a9cbcd3dca3381db8a526559fc6c6b0adce782fc7e276e4df9ec1b63cde74efc6c13eb43e121997b33da5689f7b8db6c302fb88cd424b1007eede93bce033e8fb5669a41e933df37c90aad89493f25014f415e840063c6938640ba32ce815deaa4eebe96e59541b9e8365563567b38e1a0320b3b645f88d1e0d66dd978dd327d959b2789d50e262ea24ddcb489048d967fed97be8d0387d35711a6e3954ff135f23f6b1042d380e0d98eca3b73058652f961622bf0077b00ee712281c10a7eada1c3c4d4df126f6db5ded3f96c97d28f93fd324754f358984eb47c9920ddb511065ff3cc6a48b3e5d4d2a409df2f74676ef577ed975545149516858b1577c8c99e88d0ae7637659747e9464299a9aa6e6ae4e5a94fe72f1f37c06e654def450159659ca2cb3dca71133b01ddad403a8032a3ee43b4639694c807d1e6cdc36c3ebb489b13cfc835d3d247033f0dcabe3ee455495968a43ee2483c29277096c0117838eacdb0e2dc0d513fe0fb43db091662e49e318b66e49b77bc331ff4b3a615bdbd62d42e3fd1a9c8551a882c75adf26dc5da8407c572c9bc664859fedf01c0e96b35ca9f989d314dcbd639618361fac29ff2b998ac15587b4da73eecf3548ac2178d79718ba33566138eb27c0b13947c1611723c0060672157f60cb283d5f36af8c83565fe3f09411dd89ebd70b15ccd46b5019a4079670f55e2012e6168d3b6d914a57d11ae6318767454884895172fc17e245b74771319c5c0b0693fb2d074c28fede3f53639decbbbcd7c6b886c931d145a9c783f37aa579b26907e74909143d5cbbc450628e5a1261b125f6cea96dbd71d8ba60573ef54da94e3f932580ab183039cea7fb934ad962593db919cf8fb3558e52f30d5f96ca3aed292c7653a5e388f5314e21875ce463ad8c02fe645663a4708ef404097a190e89b6af553690807c3b7d70d4bd469ef919923d0511237ff462e562c1372080e94babf7e16d97136d85eea560d9ec0b0fdba25e4f4cccd52f1c90a5d841bc3ed079fae78b93fa3afe670523f02b4fe0c8f01301a45d0f2a74538fdd1861ae7f17deebea6b39c285707d52b2142e5d9915516b4b46245290504ace8229cd43af8455f06f636eaf4a65d46bad23ce1edcf3d484bbf46cda709e4d14c8d84fe4b54ec9b217c8ecc86e98e93505e141a5e517a5614e5e39619316d210169ab4f7b3c3b82eb290b63678a5d44f13d4d5d35a7743e8e57ad4cf05ac2fabc09b779a302d404d8ecfb0295ae0096bfa04400fb3a40ff0d130a192891fce2f9b9aa2047b5140e350edb2ee079fa0f4eb312879ae0aea349a9e9a8b2516067e6c945880d81502869354899fd05a0390a637d5362f3526fc3c5e10b77b2b24f3375ddc9c1e0a5b1603ba2a23fa171219ab415e9265c198d3da0e67f1a27b7bbf31bfb790d580b5e130103a116cd36edd62f1f51f12162f150b979538ee1ffa3fa73ac908d187e586b3f8679d2928680402d88a062fd744072ab725cfc66d26da7220384e7fa71b12e3f2a4f95dc7fd30055de92c6ea025d5c8e39d5818873df1cb76d79fc5f8febcee8acbcaabeae8ecf647211b3cfb484280248dce19be5c1cc0457131de610a3f16ecc6fccde4eb830f5e87325608f3f9d45700826f03a78c5e75aabac21cacf63adb44deef45e31f922af5b4662c7737b2f95b705fe05a004c2a277622fc497e5a1a49b3bb5fe5ae79ffde31e23253bc9f63e43cf55fadf69d05ce9f701c5e53739003f340715d7315beb9c1ffcb975d1468118ec76aa5071db4bc78a0ef774729109ee76eddf8eb93ef055689ef12f3e74233ba06cfb9d19e9a1276085ec126f6792ea8a6730da09f8026d418ad2a44d6ffc53ccc46b80ddd4395c9d6a8d12c92bdb160cd2d7349cb9e6f191670bb1db64001ce6eb056da49670c69434c8c104001a522c896daf006fad370b517634a0213dc5b1bf5b96a15c38bd0a092ecb7a6eed4d833ed2a0a3f8f644d25b3e5c53382c7379a1bf8b45b5e433c8120ba0ac2c1206e1a5939ac6e9f1a90d1687dfb55733dd7f4c155fab94621a8781f5b29c76830d31534306ed521fd81ed66e52ff82fea4f5feb0ba54af19a0f5f237fe18b508d3f1cfecaa8fbdd158144800d308314228d120fa0f80eb7c2341240afe74ac756192e685f9138462e6a828b2412e6c49bc4fe745b647feb6fde6c8c75a64870e20415095f5f0974d041ab2e5afe840730aad4ca6644fd7c1d45df73c32dff0022bf53df5f634f3cd6fb8b6e7bac3af9ae53db48eda408832e459acc51ec2df1526ea2dc8db8cc3f861e7f736297a7d63a9341c3d6822acf03a4f89b9d174269b0068383fabb42a0c9baa8e599166fcbbe9a4659c89c2a78dde4f540c5c8b7d87c24fe984cfd11458bb1dda6f683ed5f1939f6584a0423453fe088cf246c85203ee9c2dcae4c41da625da4c161db4e553749917251f0b44753dce2f7a5fb1cbf2bb7334b6e1a03d223f117521c54398cd2fc43c48b291da697d79ef076480cc8f211d3f62e3222036c2961897761e1a637b6fa8969abbb5fbc5167cc0a7e2c30775723e323d5645e1d5110bf4814092dadd763c2fffc64d713415e0982ce8e88fa711b313d7c03b73d1d1076d1d896108fea2af9e67d170cb477ea03b6a4bcd8e11d31d43380940ed9b834acc0392e61ab583d5bad2c53deb58e7d41995810d67ee0074e64760351a41b5122e0731707a67d4c3c91d8fed86aa06279112bd4202b8bc8b9a3933b9a92f454b15e7c09b9a6ead4557296641daecffe69b737849382e2cfd14850fff6b6f4f7ec19267f617c59df7b47c30fcdab02ef917907ca222d6a36bb7c91801894788fc7bdd97ee3f6c6d32c00ca79470ea412d25cdf1559fbed557c70fac9373669401cebccbc49a0e7d228f0e87844ace548bdb23eca11794deb2af73ecdb9e0a9b74cfc03ae177fd6432f896ec6ff6d7c7490a1d465966ccad62d6bfbda795958c16b3906e2b1150d80bb2a4c34c5eb4f5dc05e1b9fec2abd52898b1fc3467636030e159d68589ddf918d39b36c03ec4544a95209aa1065c1619cbab6a0232060bdd73f1d5f418052ab6e9362f22096838f1550df743ac6fa5dac9fe114d4d3f50fde254b25837407d4b55eab1669df2cc1a69d8b6d5c2749c6610d3fd5eb3c2e4260005f0dbf27c3a6a5537320029bae9095035c90306800ddd9368a64d98753e889a7e8d389bd73c4fe58a70a5efd89b9559075b1fa07f55e1f2a120f04f8ec4b08554a3e2f92f245a081933f0818bf39648871ecfa3262c4807432c2dba251a6a9990193015a0bc03c1bab862095c3a05c4718c3d9ceb322b2498d40eaf084ce91e4db613793af8e625788a17251f74838b446ced5c2e803afed4d4fa1ef4dd8d4213fc1d6a32446bb35467e8097dd030d8d41cde0b0c1c3b5629d118954fd058dbe5c3657e8c88361991f8eb4657e6a40a6cea55ab29b84e9ea96192f3ea7fa60ede6f00424f1f3442ab7edc84cbef8c683e22406a0a5db0836f2b9f02113d882dfccec19b464a4748e611e8b79b970dbb910368ba02e120b1b57c4c41eecd170091b6336adb43c6eb23562cf7aeacdf9b57b08fe15852c679293419c53513b17d19a2e57e5dc4ad1b58f2fbed3f756033fdadec11162c38ef0808af6fd0fab538a08d3695411dd0b4484ff6ede92e21fb06323c16c90c73dce9bc41a99258b5e36c6fcb9a0a2e0227cc3d44f8f02572b70fa355c24e92cff5c20c0d7db91133404708f6ebc9511f4976691fc86370a8b13ec503b24", 0x1000}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000001c0)="6fe72d6a153a99070781c0f4aead9cf389294b1e2c4dad1dc6822ac9eaaae51a", 0x20}, {&(0x7f00000026c0)="53066636e1c928f98b95e99932a40b287f1431a7104ccafe2ae24fdd9d334f06e7932cb13649841a57b1fa8037f36f3c07045ff82756242e501426c011bd221a9e8ba12c9ef0b9cf94fe0301a18116c922e55bb87f39b1760d9233b0c60b04dbd06925c12c7134ec7a7908126b6ed9e9e0b11a393f7dc4d3064387e8546fa8a914ba79042971b51c378debaae772d532701ca4a7ef856c1509c2814c6cfb3009251a56a7cf6308b67d3b5a111248860c374c53e814bd3c7a99122ab9283d56697d8989f87736fb6a410b2c0b4d9190b17396e02b7776ef6fb64500", 0xdb}], 0xa}}, {{&(0x7f0000002880)={0xa, 0x4e22, 0x7, @loopback, 0x2}, 0x1c, &(0x7f0000002980)=[{&(0x7f00000028c0)="d473b63c1019ad6aeb75b78e3c49680fee59", 0x12}, {&(0x7f0000002900)="24f3244c8888ecd0717bdfecdfe999012a9d99e19e77bef00618df4d3b825bd8826eaddc17e1d186a4af258f55c0039dd5175b7b53e3e2b76837eadc0e5865f2484dfe163bdfa0234da91e9cc3431077d74d76454496271d10bc54642922", 0x5e}], 0x2, &(0x7f00000029c0)=[@dstopts={{0xa8, 0x29, 0x37, {0x3c, 0x11, '\x00', [@generic={0x2, 0x4d, "b3a029333a32afb61af9152a1002634a914cca9557f2588ffcf6af7df54b37c1506815ec57978580d445f167c9718fc798b4bf9b0ad1dd734f634ef7a0fb52b90d34d944519159711938b53815"}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x3}, @padn={0x1, 0x2, [0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo, @ra={0x5, 0x2, 0x6}, @hao={0xc9, 0x10, @private2}, @jumbo={0xc2, 0x4, 0x2}, @pad1]}}}, @rthdrdstopts={{0x140, 0x29, 0x37, {0x2c, 0x24, '\x00', [@generic={0x3, 0x50, "329ebcf12967ce2912686de568b404f5f0111c8b137643acc5290ed8117543a4b200440ba2aa72052cede7a8491e979c38a923709809d76773731e5dbce098064ffd87c9fff0bae9bf975c41c49284c5"}, @generic={0x9, 0x95, "8498f9d5da8fbc33f7e330bc2d7b76540f547d8c6b0a026c370f77e9a2509c24eefb7476ed139108c58854cabc44db93166174af3b670b5223b372261ef222fe742238598779e260f05668af7baa9a8250a9933cf090e46619edf8199c49f62a4c2048ab413ea646f24bd0dde24e20cc73b9cd6d86a588ade256bcff335bf9ead07155071a183addc9c266dfaac07993fb2a256d2e"}, @enc_lim={0x4, 0x1, 0x5}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x30, {0x3, 0xa, 0x8, 0x3, [0xffff, 0x7, 0xffffffffffffd34f, 0x40000000000, 0x1000]}}, @enc_lim={0x4, 0x1, 0x4}]}}}, @rthdrdstopts={{0x150, 0x29, 0x37, {0xf5, 0x26, '\x00', [@ra={0x5, 0x2, 0x40}, @generic={0x1, 0x10, "ff3ffe202af1bbd750d529ea68a31603"}, @enc_lim={0x4, 0x1, 0x2}, @ra={0x5, 0x2, 0x3f}, @generic={0x1, 0x31, "d533ff83e07f806b1c8c9ef65540ee3e178e96a89c4dd58636d9a8697c722a7dd04e70823fe5dd6a265061f300236c2277"}, @calipso={0x7, 0x28, {0x1, 0x8, 0x8, 0x0, [0x6, 0x495, 0x4, 0x6]}}, @generic={0x81, 0xac, "064b8e76435d1267b351fd89b80ed1e238d00ada701b2127cebbe81406721a2d7024fbd2d59f9867e2cf34bc1bf6dba170f6884761e6bd967d32a0122a82552283e5cfcde42ec2a8d28a036cb12a4b8c8a36db6c9ea729df9f33d7cbbbb6ff7bb399c9ad676c5843a2dcd89eb12fb34c77b6fcc91d886ec5d04d9b7fb75f9fbe74c2b8f7b8a1490c3087ae98f923231e00fa2fb8e10e9376d20b0aef911a13d0723f15f7c95b3b215f67ec81"}, @enc_lim={0x4, 0x1, 0x8}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x10000}]}}}], 0x338}}, {{&(0x7f0000002d00)={0xa, 0x4e23, 0x6, @mcast2, 0x7}, 0x1c, &(0x7f0000003fc0)=[{&(0x7f0000002d40)="d1efe548db8d2e08888ee3643325411bddc0bac9633cdf95445f3c52a282b21caea5d458562e0803bec4a6e76384491d620e9ca058aeb734146923472771d3d0f54603ed3070a37079da52547553ac764f317e89ab832d79f26f5b3a24643c2be546332c5c187bc7d2259d6c97a07623c1a01b845276a1fc9620992bc6cc4c", 0x7f}, {&(0x7f0000002dc0)="1878256c68ef", 0x6}, {&(0x7f0000002e00)="4993796b58fdf0a9da254cb28c818a94cbee11f965830b1eb4828592216c9f3f7d5cf02cdf73e121364cefb30f4bf39d0094f01dc3d0171e21acb43805cc5b6493225f625971451dd48bd382fd0d6c4fd6d317758394503d1c73bb3ee88e1704d0c92fa08f66e6e60cf64b3928b2d793129a34d477642d2591acfd6111c645c600f7dc24f47f10ee0673cd4806595db7cdcdd63b44aa3a368d36bfaddc057f0e396bf818979f8cd6a98b55b1e9833e30c374027b9f5d514cb42fef565382eaf05920d0db4f431fc4d43ba1f2e356564478a4d6", 0xd3}, {&(0x7f0000002f00)="bc53f6d7bc0294466806b017ab8e490668c2d2782cdf5b3dfe5ba53f60f33042d58dc0391a54fca8f4a4ba6172d297db4749758a8c20baed4f8fe21b75b23b63d760c4fb4c1b6d75959106e61c821d6056e0be4de967625529ba3559fe612368bb4208f3e26de5b05d1d2055b67303929dfb4ce35587c308380c8fdeaee99935dee4c5fe6a73b6d5d82806d64ecb0f4c41b8aa75b65d1ac12d", 0x99}, {&(0x7f0000002fc0)="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", 0x1000}], 0x5, &(0x7f0000004040)=[@tclass={{0x14, 0x29, 0x43, 0x1}}], 0x18}}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004080)}, {&(0x7f00000040c0)="77074e50ed068d5bb3af30b9995d33328bc35ceb57b433f8a9824c78bb", 0x1d}, {&(0x7f0000004100)="e7ac67f158bdf6ce10e360952575fcf0b7c73c5e4b007f09af62d8314a3f60b38bad0078e816d4b8f23c314b642cfc6130abdba082035cf299ab388f4a27e40aa1c731582413b5420fecec5e2ac7a49809f0d2b3cba7a8a6ee6b72f2048e9a6b6e5bd37fa3a05fd3f267ee08006490a4f913c8442819269a04fca4b8feb00cacc540436b590b1d731681c038adc1c4764a6542bb93a9c1cb7485f4f7913c2450ede57c1fa28e912ffa4435bdbfa2387582e540b5c433d5f1", 0xb8}, {&(0x7f00000041c0)="cdf1241faad195e2697e78afafb5955d42f39b7ad713902aab0f04d8becca3dce73052c69e869522573ba139741a35c706ee1a202b57282cf4cc38b861722c9f21a0f30c232da324ddb7be8eb5918d88631cacf271f30988", 0x58}, {&(0x7f0000004240)="fb2a7ffec7bf884fc6e886cddc6e7bc6dbdf51271372dd0086d7d37f3da625ebaef305e3f6ebf8b9705c52151a68b1fa26b22499de771fe6a4f3544ea3e81fdc84e32ff0abb22f53a90325d29efb4c4b1521b0383e63fa63fed0e95334fa5fed8c9ece55f23f7696419cc0c1d9df971f708d1099fb8ef4be83b956608b20dec8df8fdb81dd86f1e27315e44640b4ac00f6af26b112576bf36bdd08cd1602546e561eae789c052075e4513f6eea27792c46ebef51f947e874bf3383715c880b03de69522c51d6dfdeef230a613000c60724de13d218e07a15cdf54fee8113b5acf9", 0xe1}, {&(0x7f0000004340)="81a6862cdd7f4e2bce14402dc79cc0e8e2b74cc54de7625291bdd366eff034dc8fe70ba2c6194cb8390ca7d5", 0x2c}], 0x6, &(0x7f0000004400)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0xfff}}, @dstopts={{0x20, 0x29, 0x37, {0x67, 0x0, '\x00', [@pad1]}}}], 0x38}}, {{0x0, 0x0, &(0x7f0000004480)=[{&(0x7f0000004440)="1efdde21d02badb24662a3359d8f492becfb1fae01721ce4f2d03470129a847d9f8b9fbb40fca515", 0x28}], 0x1, &(0x7f0000004580)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x33, 0xa, 0x0, 0x0, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @private2, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8}}, @pktinfo={{0x24, 0x29, 0x32, {@private0, r2}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x2b}, r3}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @loopback}}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}], 0x128}}, {{&(0x7f00000046c0)={0xa, 0x4e22, 0x8, @private0, 0x59d}, 0x1c, &(0x7f00000048c0)=[{&(0x7f0000004700)="02812bc8793e1a798a79e9cfc4e1382a55f549f88aca01f41a3074cad5803ab57e767141707cb78118ab1ee09fbb3152446f3910fd3861d5fd8538170e7292de50f188337ac55d72f44c466a4949ee4bb3f210ce47040adfa3f8358adb1daa3c80dc77518794aba19a0af71218b1c5f5bff246270e8189b817f5fabdc5c8243d8a23724fef16473416da94700553388a46cc9893cdb81aacc51f51e6e1e135e491f29e3e7d540b696f91aabae9452c574f4915d53e9b9faaee484ac56418796deb591afebe2b605588", 0xc9}, {&(0x7f0000004800)="e17795f224e9686ccc24005084858f55e4a50fa77aa29d60ab698aaf0eb897357ceb07", 0x23}, {&(0x7f0000004840)="5be7725e4bfab840bdedc989c90351fc480ad6f3214adab94fe38336bf83227a12138f", 0x23}, {&(0x7f0000004880)="c6cfe59e01fb3103873f0db97a044fe36f94a800c2e0fd479f6ece904ba862d4095f7dfad31cbb4409f8f23271684c", 0x2f}], 0x4, &(0x7f0000004900)=[@hopopts={{0x20, 0x29, 0x36, {0x8, 0x0, '\x00', [@ra={0x5, 0x2, 0x4}]}}}, @dstopts={{0xc0, 0x29, 0x37, {0x3c, 0x15, '\x00', [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @generic={0x20, 0x7b, "d9ce8291a89a59a12eaf84dee429e10ae7afc5b8759cc9cd9c7b5eeb03400a2e3d36b4b4c11eb7c4f9148ce44cf83e2422666d4774926f1ba6c915d9ae620bc0478e9fa2d30562735cebbb82169c9598f7558f50c5c6fd38aca32b881564838a595bc83dea840109cda62165c3cf3aa90a8890546e7a312f76050a"}]}}}], 0xe0}}, {{&(0x7f0000004a00)={0xa, 0x4e23, 0x6388, @private2={0xfc, 0x2, '\x00', 0x1}, 0x200}, 0x1c, &(0x7f0000004d40)=[{&(0x7f0000004a40)="6307d52ada170dda4ec02f0d102941d472ce18315dbf3d9bf6ce4d05411f893f4d6035214e29ea6dbb245600bdbe1fa32904756bf598c674e38da76f2c464e390a8c3ed9d273de0d42df2379680bb53d", 0x50}, {&(0x7f0000004ac0)="8ce8ceb19440d785f6fba177dc3357cd977167b9188e2e644499b96e3dc2fbdfc8da3fadbc40ba266642febe384b53edba56cff5244876345775a77ffda30dd2a9d4c85c90ef2c9b375aac428bf1b1124c92f751aa8550fc15b75aa75067c8c555ba83f93c0b", 0x66}, {&(0x7f0000004b40)="92b51a5774025021abfb9242d04a7b5d1ec9611c7574cacea16074d9806f955afbf06a718a520b23cdb5825ecd8edee7207665f4d9a8939bb05fb8e269f6144c0b1bf7372c0ec57118d1ad50a321a39f80083ba7e6562cbf9247e331da9e44b59d660ee6e31a48bbcebe6ba626a6dd069c779c7446f7d4587d359c48b8b6dc96bdab87a86d2d5572b400", 0x8a}, {&(0x7f0000004c00)="2d6861be10c985f98eafb8ece603913171a5f25e070db16fef45a699a148b5e42346199ffc6358d97af73b6502b3627b6238c3c2938c8af80704d7ba0db016094ff6914d0e538173a2fa981f24f75bbc48f57048d25c120f39aca7cf9e063ffbb5b371d9b5a5e4d912b138942ecefef61ecbd6e43aeb50ebc16af4053e62de65ecd99b3a586d90f43dcfed9d09e69682da79b894d37e", 0x96}, {&(0x7f0000004cc0)="38c4e32e45c0d1be94b7c16837df03fa6db1ede38e31c1d94f2576bf1838fa3c1bef866be2cf7ffe8e0ca29a6b", 0x2d}, {&(0x7f0000004d00)="477114445ac3b427abfdfa4946262ce85ff965b4aca60015484f3e2dbb7c601449bfc0d98091157c1c", 0x29}], 0x6, &(0x7f0000004dc0)=[@dontfrag={{0x14, 0x29, 0x3e, 0x8}}], 0x18}}], 0x7, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x74) bind$packet(r1, &(0x7f0000005000)={0x11, 0x0, 0x0, 0x1, 0x7f, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}}, 0x14) setsockopt$sock_int(r4, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000004080), 0x40, 0xd8ceabee74865974) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) sendfile(r6, r7, &(0x7f0000004fc0)=0x3, 0x1e) 10:08:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x600}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, 0x0, &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 111.891546][T12453] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x300}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x242c00, 0x0) r3 = syz_io_uring_setup(0x70dd, &(0x7f0000000240)={0x0, 0xce2b, 0x4, 0x2, 0x12d}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000001c0), &(0x7f00000002c0)) fcntl$getflags(r3, 0x401) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000040)=0x40, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000140)=0x68) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) copy_file_range(r2, &(0x7f00000000c0)=0x8, r1, &(0x7f0000000100)=0x4, 0x4, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x700}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x500}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x900}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 112.039800][T12482] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:08:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, 0x0, &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x600}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c0100001000130700000000000000d600fe8800000000000000000000000000017f00000100"/65, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000049000200656362286369706865725f6e756c6c290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000042000000"], 0x13c}}, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f00000001c0)=0x9, 0x4) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x8000, 0x80, 0x200, 0x2, {{0x6, 0x4, 0x3, 0xf, 0x18, 0x66, 0x0, 0x20, 0x2f, 0x0, @remote, @loopback, {[@timestamp_addr={0x44, 0x4, 0x66, 0x1, 0x2}]}}}}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={@local, @remote, @rand_addr=' \x01\x00', 0x80, 0x279e, 0x2, 0x100, 0x7, 0x200, r4}) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f00000000c0)=0x3, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xa00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0xfffffff9, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r0, 0x80000) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000), 0x4) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) [ 112.147263][T12507] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:08:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x2100, 0x0) 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x700}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 112.205567][T12521] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x900}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xb00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x5, 0x4, 0x7fef, 0x2, 0x7}, 0x14) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@migrate={0x50, 0x21, 0x10, 0x70bd27, 0x25dfdbff, {{@in=@local, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4a20, 0x0, 0x4e23, 0xc572, 0xa, 0x80, 0x0, 0xff, 0x0, 0xffffffffffffffff}, 0x6e6bbe}}, 0x50}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x8, 0x0}, {0x0, 0x0, 0x80}, {}, {0x0, 0x0, 0x3}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) listen(r2, 0x4002) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x7, @private1, 0x40}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0xfff, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r4, &(0x7f0000000140)="674d6579701a7c3298bfd1f7eaaa2a48ff785f2b5ed0bb479d209438faab938a4c449263613db7d145353053e59aa7ea8cdabd090257906d58b1413786e5de1a1e9a06cbf5cf2fd4306c1812d458474003a7c3d31e1c", 0x56, 0x0, &(0x7f00000001c0)={0xa, 0x4e24, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0)=0x3, 0x4) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r6, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = open(&(0x7f0000000340)='./file0\x00', 0x400400, 0x47) renameat2(r7, &(0x7f0000000380)='./file0\x00', r2, &(0x7f0000000000)='./file0\x00', 0x4) bind$inet6(r6, &(0x7f0000000300)={0xa, 0x4e24, 0xda48, @mcast1, 0x7fff}, 0x1c) 10:08:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xc00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 112.310381][T12521] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. [ 112.335568][T12538] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:08:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x11, &(0x7f0000000000)=0x2, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xa00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x2100, 0x0) 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xb00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = fsmount(0xffffffffffffffff, 0x1, 0x8) setsockopt$inet6_tcp_buf(r2, 0x6, 0xe, &(0x7f0000000000)="4f4b894f3b09ac3f3e18613054176d474c14", 0x12) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xd00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xc00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x3) connect$netlink(0xffffffffffffffff, &(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400000}, 0xc) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x2100, 0x0) [ 112.499500][T12571] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:08:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000000)='./file0\x00', 0x0) recvfrom$inet6(r4, &(0x7f0000000300)=""/4096, 0x1000, 0x40000140, &(0x7f00000000c0)={0xa, 0x4e24, 0xffffff81, @private2, 0x12}, 0x1c) 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xd00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xe00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e24, 0x200, @empty, 0x401}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) open$dir(&(0x7f0000000140)='./file0\x00', 0x375800, 0x98) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x0, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x89000) [ 112.582048][T12593] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:08:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x0, 0x0) 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xe00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x7, 0x0) 10:08:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) listen(r1, 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x1100}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x1100}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 112.707692][T12617] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:08:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x0, 0x0) 10:08:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in6=@local}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) splice(r1, &(0x7f0000000040)=0x6, r1, &(0x7f00000001c0)=0x7, 0xffffffffffffff01, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @local, 0xd975}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:57 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0xd00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x1200}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x0, 0x0) 10:08:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x1200}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x1400}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0xfffffd07) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) listen(r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000002540), 0x0, 0x200000000000004, 0x0) 10:08:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x1400}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x2000}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7, @empty, 0x7fff}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x70bd2d, 0x0, 0xa}}, 0xf0}}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x13c}}, 0x0) shutdown(r3, 0x1) [ 112.917463][ C0] scsi_io_completion_action: 19 callbacks suppressed [ 112.917491][ C0] sd 0:0:1:0: tag#5773 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 112.934051][ C0] sd 0:0:1:0: tag#5773 CDB: opcode=0xe5 (vendor) [ 112.940393][ C0] sd 0:0:1:0: tag#5773 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 112.949551][ C0] sd 0:0:1:0: tag#5773 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 112.958627][ C0] sd 0:0:1:0: tag#5773 CDB[20]: ba 10:08:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000000, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0xdc, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_STA_FLAGS={0x18, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_WME={0x4}, @NL80211_STA_FLAG_AUTHORIZED={0x4}, @NL80211_STA_FLAG_ASSOCIATED={0x4}, @NL80211_STA_FLAG_TDLS_PEER={0x4}, @NL80211_STA_FLAG_WME={0x4}]}, @NL80211_ATTR_STA_EXT_CAPABILITY={0x5a, 0xac, "47897225f4903106c305991a0cc7598d73ca8e6c2eb356db779104377c9d0c795db4575fea24e7a7fe877a18dc99b376727e3dffc65611f825f4cca62f311b33e9e9251511ff30fd3b657aa2d695f3638d0e612fe128"}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x4}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x1}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xa, 0xbd, [0x7ce, 0x2, 0xee0c]}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x19, 0xbe, "6fdd1d39803d3737081fb1ffccbd4458b2563892bd"}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0xff}}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x1}]}, 0xdc}, 0x1, 0x0, 0x0, 0x1}, 0x20000080) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x8004, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7fffffff}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x40) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:58 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x0, 0x0) 10:08:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x2000}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000300)=""/155, 0x9b}, {&(0x7f00000003c0)=""/221, 0xdd}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0xf4a4a5b96b0e8c91) setsockopt$inet6_tcp_int(r1, 0x6, 0xc, &(0x7f0000000540)=0x6, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040)=0xffff0001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}, 0x1c) listen(r0, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x8500}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 113.082776][ C0] net_ratelimit: 13 callbacks suppressed [ 113.082792][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 113.099725][ C0] sd 0:0:1:0: tag#5776 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 113.109575][ C0] sd 0:0:1:0: tag#5776 CDB: opcode=0xe5 (vendor) [ 113.115939][ C0] sd 0:0:1:0: tag#5776 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:08:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x100, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7fffffff}, 0x1c) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x989680}, 0x1, 0x1}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r3, 0x681, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r3, 0x2ff, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) connect(r6, &(0x7f0000000240)=@l2tp={0x2, 0x0, @remote, 0x2}, 0x80) 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x9d00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 113.124990][ C0] sd 0:0:1:0: tag#5776 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 113.134043][ C0] sd 0:0:1:0: tag#5776 CDB[20]: ba 10:08:58 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x0, 0x0) 10:08:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) r4 = dup(r3) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000240)={0x0, 0x0, 0x5, 0x0, '\x00', [{0x1ff, 0x8e, 0x3ff, 0x7, 0x7f, 0x4}, {0x8, 0x8, 0x8001, 0x7, 0x1ff, 0x8}], ['\x00', '\x00', '\x00', '\x00', '\x00']}) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000040)={@mcast1}, &(0x7f00000001c0)=0xff85) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000300)=""/155, 0x9b}, {&(0x7f00000003c0)=""/221, 0xdd}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0xf4a4a5b96b0e8c91) setsockopt$inet6_tcp_int(r1, 0x6, 0xc, &(0x7f0000000540)=0x6, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040)=0xffff0001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}, 0x1c) listen(r0, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) [ 113.266936][ C0] sd 0:0:1:0: tag#5779 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 113.276825][ C0] sd 0:0:1:0: tag#5779 CDB: opcode=0xe5 (vendor) [ 113.283207][ C0] sd 0:0:1:0: tag#5779 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 113.292244][ C0] sd 0:0:1:0: tag#5779 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 113.301307][ C0] sd 0:0:1:0: tag#5779 CDB[20]: ba 10:08:58 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x100, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7fffffff}, 0x1c) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x989680}, 0x1, 0x1}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r3, 0x681, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r3, 0x2ff, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) connect(r6, &(0x7f0000000240)=@l2tp={0x2, 0x0, @remote, 0x2}, 0x80) [ 113.355302][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x4}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:58 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 113.425305][ C0] sd 0:0:1:0: tag#5782 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 113.435182][ C0] sd 0:0:1:0: tag#5782 CDB: opcode=0xe5 (vendor) [ 113.441523][ C0] sd 0:0:1:0: tag#5782 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 113.450600][ C0] sd 0:0:1:0: tag#5782 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 113.459654][ C0] sd 0:0:1:0: tag#5782 CDB[20]: ba 10:08:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040)={0x30b040, 0x20}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000001c0), 0x4) 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x5}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x4}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 113.536512][ C1] sd 0:0:1:0: tag#5783 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 113.546387][ C1] sd 0:0:1:0: tag#5783 CDB: opcode=0xe5 (vendor) [ 113.552735][ C1] sd 0:0:1:0: tag#5783 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 113.561761][ C1] sd 0:0:1:0: tag#5783 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 113.570823][ C1] sd 0:0:1:0: tag#5783 CDB[20]: ba 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 113.599771][ C0] sd 0:0:1:0: tag#5784 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 113.609642][ C0] sd 0:0:1:0: tag#5784 CDB: opcode=0xe5 (vendor) [ 113.616091][ C0] sd 0:0:1:0: tag#5784 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 113.625160][ C0] sd 0:0:1:0: tag#5784 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 113.634222][ C0] sd 0:0:1:0: tag#5784 CDB[20]: ba [ 113.637104][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:08:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x300, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x28}}}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x8101) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socket$inet6(0xa, 0x5, 0x7) setsockopt$sock_int(r4, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r6, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r7, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r6, &(0x7f0000000000)='./file0\x00', 0x0) sendto$inet6(r7, &(0x7f0000000300)="bdda13f869ff101a73afb395a983f7f1dfc98483c003d2c7b72d4fae7c4bbf3ffca74547415f4c743364ef1ac1720c78f2197d28ffe2b4551468f8e628c53d1f7d3d48b4c7c584b0b5d3af4869f7f45f65664b9ad5b56c7f17ea15a5e7a9301a6fb0d7ffe34880e2aa090fb0700cd7dbfec6c062c8161b5a75ec06664e4d5e85991aa38e552a87996b1b814dfc5a19b8e3246d92304acc2fca5dda8f5db7e50fc208f4de1a528c7d0afe581240a8fe19aa6999a1a226d6592fcb06959288dc69293e6bea60af0c5215b1943d040ba7060fb33a83b6df9e136c20361be1154e1fb0baf4522cdd5d1758f5beb0452c14b8da9ab84fea9c9ef60879600048dacdfa66a58f48a9af6c39d0f20e7cef3cbd2c8400bc0439335f0b6c47335f55a0ab569013b60a0221319e9d6a40410dccbec18d98b073af22fd4732d9b2278d95e9f6d24562292dce98747244a9ec87852aaa6947b5076aa3519dbd8d7e617b1244a4dd28b24850ca150b4254bc70f33606de40f00eddeb57378c3ab1b9d8ef9da483d25299a5ad86f569fed4dd77b7736b8a635d85279a1ef55ec71ae9f5aa111c7fbce9f14e722aea69d22b5532b0caa1a094373a1af504686ce3c792f4c81f1ec1fceef9638efb89e1913e4e54fc2a11ebc04860a1dfe58dbf26b955c5675703e87c57dac551514a122d02b1a6c628e118c1bb813a3acf682c842f10f4b5f75c8d6090470d71444c993bdb2ae3f3a23e14af47f90ee03bb4beb0d6bde738cf74d0b89b2f9c5243d33abd20140b63706f2c67c2d55b68c71b58d636cb8b92325717b1266b1711b14242b8662a04814d362d3483c2fce89aecb28e9a7ae831bb09e8857c3f1e077abdc54c712228e47203246d61ac724b2391cd39910338bbb376028685384f3d37cb6af129cb7a4afb15969c507a998861db0ad2f6ba053df592e8c7ac124ded1eceab32776253ec9f7182e50884c703dfaa0154e8d03cdbe1e510516b361d6275e71375f3780201a0fb1d88bc50c279a955ffcd98a49ca15bb0ab0664d6b5cb667ff8daa80752208110e70ce9e90b101e81157008920e5dac37a420b69a9c8cc64c722add41519db31006f6fa31ea33479d7c654270bd6bcf0c68531b315abded8eca704413c2f2e0d68383f21ee67cf056405af43bf520b28f1fe75b140238c5df744e95e610b8a7ea32b16a7656b4afa84bbb186673df4f479dd3c4cb6bac55d4bca49c166a25efe88ee94181795166852a0d80d178c98fc99438246caf947dc12f3879d310057a74039a36f8e7723a7ffe44a351581033f2e8dcff79a86720d54e4f7be3418b679ffb307db47cf03ebb8c39b0d8de6531444fab9750d59119ebec561058c473e1c026005f4922749a0221c42fcb68a0a523cd6f2162fd486f1354d3aa105b100ce514088b8b70d3c1c54612c49eb2643d00cdd1fd375c35fa885340c53a43d9ff4dcbdb5ad18fa0f533303abcd20a70bb750cf4f05ebfe5bc282fbab3966de87dbbcdb0b3bc10404aadb584c50a7b1af5c852da5eb87038c60384430c9b021e02ca51db68954fd1a1f163a35e899b0714344bc2f977e79a0049e427e6fb5a161d64f7e5ccd3aca76113849262834f3999bfa02919ded3bc25a1434a218c34e838bc30560d7fd576b0d59865030566425c91252a064d0998b47c38646ea8d3a64760276c9efc624253d264e8c96315fd955024786f9bbbf7ad0408fe5cd8bc516956b2b1570a9cf823e7247e59481477e9e446ab38ae86594004f34b90aa1563b63bc01de9baea5f2479e54a8db04d50a3f5adc01bd9798ea26cf7be75178a52d5bfe6d555c43b3bdffcdc3c10021624bf0f9e37117833048808a923b2bfd3aa6bd8fdc845b3d7693bbbf6c75e5038c89828c13287688877bf43875d8b182bfc2adcd43cc46ac88fb9db748cd51bf9ae55a6eb07750522161e131c41e5b0264f181a2b46f4e3ab2f387caf2697a4672a2386b7121627919a362b83c8a62475300f1c439348ff5ac31365fb388617ade77858a38b6b10b89a5624232d4c14bd0d2d8f428fa15c02b940003850cbe28722eee433eb3809a8b716107701ff338804e6233a66f9e8ed227dd71188d0d4a14c1afd8ed61d069e19ba52209e51694d8eebed7f7ca41f20c0d93e49979ce9ba48569f17c09692220a3573c8602ecf3cb4f09e252a7497c9b8492fa6a896547dbc96256b7e252a565526cc52ec95d575f8e5e50ffd8033edce07a9cdd9ee1a6078ce39481e2b42fc477c8f8fa1d7ba6145aead304dbef73c493d06554cfb3d7c68fdf7aed273209fc2170d1c3ac619f5f8fb218145d804a518494f4ed913ef20e2c4240f1ca4b4c86757673662bd048ce4e6f0376bce2767dc47ebb049d3223e6bf962f7a14bb93721c697a808d48835afb1c9330c21bae2598cb9c782b7e71cd14279523b0789f7030325271f4c26f8a586e5ca00bfe4b109ca9ba3d9844e6d22c4874d5344cda513c3c122331404bdda084a549c56f37d4fef52b823a3b8acaa20111785caadb8d53d11a3b83f708f02a97d0bb6bcf8d476dd995b92c443cdd205141795c6308f77bc522d028153a5e71249d6c388c223793c4a4aab35a94d5fdc2b9148ac078d2ed3faf55e83047e16b48e5632d915a121c061da1d52240a043b5c6d4c263786deb635c4cb64868f5228e3cd0397af5b7fbef3492c3cdd3eb5079a5993be0c092d21f3720098e69a8cbbc2ed54cf7c1d04234e2e95b3f6cd250ca722bed3579f271fcf483b61fe1e6948ce9ebb0b1448f1fd3a237e24cd378b559cd1a81144d0016da9fbac32dd3734ec6dbf461fb2b82f7fb24bbec3b3501b2b3ef7e028507fe7354e644afefa7f7d3f071a96529e90b878bffaa84bc1ec3632acd6bfac0e8dd3731280043761c5da3a62a1b9e2cc67f9d575626e9ac7927ee7dc6943bf65b0eb86549a5ac64d48b4f63f7b107eb4520c4fcedafdd7239fc0e4a020f4ca27dbddcb5ce89c158338384c5ba83568cdc7676c1c9192473e4dd4b5cc4fedc4fb20d69489c208ed8ed9fba36087e2e4f0efd00d5cdd5a1fe14226789361f32ded04824b11dfde02b2d5239b1797dac6acda10d7eecc611af95f68c503e11997ccc39a93b3ef064f143b7bd23df5e1b610a0dc2d751b4479de671c61f6a112dcabd75ffe1974ea9819c533add6e2aaadb75c1a50bb820e9c53c0fc59fc8964fae81a1096b61509c34f98360c62a9c6088f2cc7d2e597376c3c6678df36a9664f8ac0574f21c8ce3180719dff65b8f77a8f681a8d3b9537eb533307538c9ea942d9cf6a1efc94af94936c1963b1dd2828716f7b862a2e1fa9336f0c3b4492bfde23c716ce7102ef0294fda80b383d76e74776ca3083808c54c12d584a64e172e321a2047910d4d102d740f652c1820be69872fd70f01b864cba61df10baf64d137368ac223b5e5fadc5c9546f4f57eab5506641cd95bd15884f11b24e2c6044e154daad0bcd4c5065990f14f71c36ba2e39ed83fc6dd0412a5a1876d740891c183cee5711f14080ca09318fff2efa38c1382a96524746b1c7d6cfcdcd0669a1b6b7e57d0dc2bb1bf536e07cbe475159e018ec3e5ec54cc8ff9175a4de2f207d1da8b64b971b21f9358ba6ae467df2b57b977bbd9272a0ec9c680cc63ad10eca3b4b90d5c388e7c81523881f7513d2be5bfb084f1c6abb5863e5af98575b910578a858a5c9ea742c1a28b0ae1456dae55e6edb40d5c8194db1eeca2f55e1f8e985751beaddb187b8ed1a9c68bbec1dc33f4a1a777adb7e6e98955527d3bb0442719684f9520a4ae1d3946f571e8bcb75026580b77afd3835824d85adf590432112912e329eb632d298c1885e0ef661c811a8bb47c99d5f948fb26dc5e04609fab64e10810cbe75bdd00455bbd75e226d0d080dfcb3ef4b60610d30aa2361212826c6ba76a7322648639df96ae565e0304d91c8bc6bda24d614549ea6809f60e825a3b37ff14ecb9bdd3b0c47e2d410d78dbe85e3c1b35f9ad89ca707a5e790ce6052f679d6075d3806629cb99d1d7bbc819866e0904697841bd61fe11cff77cda6760b9f0631747fa7fb1bbbfa01219a95a46f2a8a6122e16980a090e4bebd2a6f1ec62b629e964ace228cca950ed97379ed90a92572e8730c2021f0f45a95609c0fb539740f8a120205aeb9d9b1e32db3e0120b23802af41442a1aa9bb14aa998ca7c4e297dec3bca7ff690e632062b69895b5fb51f428694c519d2c2ef6945e9b3ad34579e6e626cd0a9bf866351ef93294c80712744c27831e36576ceac35e175b42f37124ef9252b619ff97a4bd7788c08880c6547ae97754f479645aac285273ed38ab82b8a6f246895c2b65a8e211226afecc190f6f6f6b2e4886cf029137c1596d501332aa40a2ca6359f2052068be949c11cb8250fd52f6ac007be3273661574a34c618cbafc52dd286d5857e693b46a6452fa73101da0faeb1b7e3f434cf00746ac5b576c0f2fe70ed77339c2ebdc589e038a32b3dbe9c69ca3d814be09c254320d3afe9694409703c719f15ba45fd1a32f67eef7b19d06146ab65bd50b85dcf598ac441cc5f0b6017697a918740b521643ca9e2995af4c71df1c8ba1847338103dd730a0302dd5bee0b2a990042b2810d50d07f7c2f87c7b8ba5c38617229e8bbc091856e78902f14143af9b612d2f2c7048d147aad957303d9b5d68a7bfa73e3e37df6f20d35e3ef80ebb6a416e0870e94dba3ddde949dcccb011dd3194336d627f60fa4cb18943aadafe312078c98620629538d4b44f0857c74619c102907be8651bc3083f15cfa1370bc33b23814ec72376e159a2d37d89557efa9912a6b82feed7af1d6482cefcf20cfdc830b1baa64733f41316d5cf9ea5d48bb864b25ffb3c91944f9486e4175f5aac25e9539ac99156d4b6765c967b95bf676643650317af0fe9136c970735054c004536103d177916c4bd55d574bea006c8dea06ef0ad8e99c1b660445a4b539579312e98abf9b1e450c221223054414eb8453d9f379be80f0ca57bd12d5eb858a49822461eb5b01e5af89225b33ceadb7a17af56ac19ab12503e3bbf89366804e7c30675c681c4cca589f2954da83df86f1876c6a6df4cb98be69d6fac2dbc443a29b2065bb224f792ddb22857f0e0bb73e650b0dbd51a87c09974adca532e40d321490ef6c297fd911350d55b7a63bd32020fad3a7a51929a4aee6589d81877912149ff684825e4cd6102ecefbf250688135f05b3edd0eb3d20ba4c75eff0ab60750226cf18214b66c4ba558da249d3c1c2998da0fc554c5327949fc9efd37c531cd0a8b8fd8bbf2c890e58b386754898f14d7cbc996fe525f3a564ace7f762f2a4363e727ae04174aa7dfce7335f119e3b8560a6e6f74878915924e949459cf31717e1cf9e89e0c0a9ab8f3ce4ba8e642a7418decbf9cde34bae939b4ae503508569c69977b8d5a8ff8aad9fa6c209895afc16b29db165fdd35fb176ff51cdfc9a40869bb3e6437c836318fa51f1425b5dc83dc364ca7bdf1bdfa3699aa07c1ca0157d2023a6623299f1a4ea66b196e892c8874c2da2071d64718ece6a35cefea10a809787348e708393ca323aeaf5a92655b762e7a820307feb4597c9bd572701dce526168309bff170c2a43d36096c62057d0e3433e454a6da8af6c5ad0d0ee443e854c37237a5f5fb11281f6dce1565c289d8a6d53adc910cdd54a6927211c8a2072304cc64f93cc8740252bc831b57569639ae0b759108306114478d0c36888f1f29373dccfeefedf0a07f09", 0x1000, 0x4008000, &(0x7f00000000c0)={0xa, 0x4e22, 0x1, @remote, 0xe24}, 0x1c) preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:58 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 113.711037][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:08:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x5}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x7}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000240)={"60866d4ce8789f8192d51b77dd8310ff", 0x0, 0x0, {0x79, 0x2}, {0x2, 0x80000001}, 0x9f1, [0x1f0, 0x0, 0x81, 0x1ff, 0x99f8, 0x2, 0x8000, 0xfe23, 0x1, 0x9, 0x1, 0x9, 0x8000, 0xce46659, 0x4, 0x100000000]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000380)={{}, r1, 0x12, @unused=[0x8, 0x400, 0xffffffffffffffed, 0x5], @devid}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8442}, {0xa, 0x4e22, 0x7ff, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x81}, 0x497, [0x3, 0xba4, 0x81, 0x8, 0x0, 0x8, 0x3, 0x3ff]}, 0x5c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)=0x0) setreuid(r6, r5) setfsuid(r6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x3500, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) setsockopt$sock_int(r4, 0x1, 0x22, &(0x7f00000001c0)=0x401, 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r7, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:58 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x1400}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x2000}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 113.754079][ C0] sd 0:0:1:0: tag#5785 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 113.763933][ C0] sd 0:0:1:0: tag#5785 CDB: opcode=0xe5 (vendor) [ 113.770278][ C0] sd 0:0:1:0: tag#5785 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 113.779342][ C0] sd 0:0:1:0: tag#5785 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 113.788405][ C0] sd 0:0:1:0: tag#5785 CDB[20]: ba 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x8}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x9}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x1400}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 113.831448][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:08:58 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x2000}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x300, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x28}}}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x8101) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socket$inet6(0xa, 0x5, 0x7) setsockopt$sock_int(r4, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r6, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r7, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r6, &(0x7f0000000000)='./file0\x00', 0x0) sendto$inet6(r7, &(0x7f0000000300)="bdda13f869ff101a73afb395a983f7f1dfc98483c003d2c7b72d4fae7c4bbf3ffca74547415f4c743364ef1ac1720c78f2197d28ffe2b4551468f8e628c53d1f7d3d48b4c7c584b0b5d3af4869f7f45f65664b9ad5b56c7f17ea15a5e7a9301a6fb0d7ffe34880e2aa090fb0700cd7dbfec6c062c8161b5a75ec06664e4d5e85991aa38e552a87996b1b814dfc5a19b8e3246d92304acc2fca5dda8f5db7e50fc208f4de1a528c7d0afe581240a8fe19aa6999a1a226d6592fcb06959288dc69293e6bea60af0c5215b1943d040ba7060fb33a83b6df9e136c20361be1154e1fb0baf4522cdd5d1758f5beb0452c14b8da9ab84fea9c9ef60879600048dacdfa66a58f48a9af6c39d0f20e7cef3cbd2c8400bc0439335f0b6c47335f55a0ab569013b60a0221319e9d6a40410dccbec18d98b073af22fd4732d9b2278d95e9f6d24562292dce98747244a9ec87852aaa6947b5076aa3519dbd8d7e617b1244a4dd28b24850ca150b4254bc70f33606de40f00eddeb57378c3ab1b9d8ef9da483d25299a5ad86f569fed4dd77b7736b8a635d85279a1ef55ec71ae9f5aa111c7fbce9f14e722aea69d22b5532b0caa1a094373a1af504686ce3c792f4c81f1ec1fceef9638efb89e1913e4e54fc2a11ebc04860a1dfe58dbf26b955c5675703e87c57dac551514a122d02b1a6c628e118c1bb813a3acf682c842f10f4b5f75c8d6090470d71444c993bdb2ae3f3a23e14af47f90ee03bb4beb0d6bde738cf74d0b89b2f9c5243d33abd20140b63706f2c67c2d55b68c71b58d636cb8b92325717b1266b1711b14242b8662a04814d362d3483c2fce89aecb28e9a7ae831bb09e8857c3f1e077abdc54c712228e47203246d61ac724b2391cd39910338bbb376028685384f3d37cb6af129cb7a4afb15969c507a998861db0ad2f6ba053df592e8c7ac124ded1eceab32776253ec9f7182e50884c703dfaa0154e8d03cdbe1e510516b361d6275e71375f3780201a0fb1d88bc50c279a955ffcd98a49ca15bb0ab0664d6b5cb667ff8daa80752208110e70ce9e90b101e81157008920e5dac37a420b69a9c8cc64c722add41519db31006f6fa31ea33479d7c654270bd6bcf0c68531b315abded8eca704413c2f2e0d68383f21ee67cf056405af43bf520b28f1fe75b140238c5df744e95e610b8a7ea32b16a7656b4afa84bbb186673df4f479dd3c4cb6bac55d4bca49c166a25efe88ee94181795166852a0d80d178c98fc99438246caf947dc12f3879d310057a74039a36f8e7723a7ffe44a351581033f2e8dcff79a86720d54e4f7be3418b679ffb307db47cf03ebb8c39b0d8de6531444fab9750d59119ebec561058c473e1c026005f4922749a0221c42fcb68a0a523cd6f2162fd486f1354d3aa105b100ce514088b8b70d3c1c54612c49eb2643d00cdd1fd375c35fa885340c53a43d9ff4dcbdb5ad18fa0f533303abcd20a70bb750cf4f05ebfe5bc282fbab3966de87dbbcdb0b3bc10404aadb584c50a7b1af5c852da5eb87038c60384430c9b021e02ca51db68954fd1a1f163a35e899b0714344bc2f977e79a0049e427e6fb5a161d64f7e5ccd3aca76113849262834f3999bfa02919ded3bc25a1434a218c34e838bc30560d7fd576b0d59865030566425c91252a064d0998b47c38646ea8d3a64760276c9efc624253d264e8c96315fd955024786f9bbbf7ad0408fe5cd8bc516956b2b1570a9cf823e7247e59481477e9e446ab38ae86594004f34b90aa1563b63bc01de9baea5f2479e54a8db04d50a3f5adc01bd9798ea26cf7be75178a52d5bfe6d555c43b3bdffcdc3c10021624bf0f9e37117833048808a923b2bfd3aa6bd8fdc845b3d7693bbbf6c75e5038c89828c13287688877bf43875d8b182bfc2adcd43cc46ac88fb9db748cd51bf9ae55a6eb07750522161e131c41e5b0264f181a2b46f4e3ab2f387caf2697a4672a2386b7121627919a362b83c8a62475300f1c439348ff5ac31365fb388617ade77858a38b6b10b89a5624232d4c14bd0d2d8f428fa15c02b940003850cbe28722eee433eb3809a8b716107701ff338804e6233a66f9e8ed227dd71188d0d4a14c1afd8ed61d069e19ba52209e51694d8eebed7f7ca41f20c0d93e49979ce9ba48569f17c09692220a3573c8602ecf3cb4f09e252a7497c9b8492fa6a896547dbc96256b7e252a565526cc52ec95d575f8e5e50ffd8033edce07a9cdd9ee1a6078ce39481e2b42fc477c8f8fa1d7ba6145aead304dbef73c493d06554cfb3d7c68fdf7aed273209fc2170d1c3ac619f5f8fb218145d804a518494f4ed913ef20e2c4240f1ca4b4c86757673662bd048ce4e6f0376bce2767dc47ebb049d3223e6bf962f7a14bb93721c697a808d48835afb1c9330c21bae2598cb9c782b7e71cd14279523b0789f7030325271f4c26f8a586e5ca00bfe4b109ca9ba3d9844e6d22c4874d5344cda513c3c122331404bdda084a549c56f37d4fef52b823a3b8acaa20111785caadb8d53d11a3b83f708f02a97d0bb6bcf8d476dd995b92c443cdd205141795c6308f77bc522d028153a5e71249d6c388c223793c4a4aab35a94d5fdc2b9148ac078d2ed3faf55e83047e16b48e5632d915a121c061da1d52240a043b5c6d4c263786deb635c4cb64868f5228e3cd0397af5b7fbef3492c3cdd3eb5079a5993be0c092d21f3720098e69a8cbbc2ed54cf7c1d04234e2e95b3f6cd250ca722bed3579f271fcf483b61fe1e6948ce9ebb0b1448f1fd3a237e24cd378b559cd1a81144d0016da9fbac32dd3734ec6dbf461fb2b82f7fb24bbec3b3501b2b3ef7e028507fe7354e644afefa7f7d3f071a96529e90b878bffaa84bc1ec3632acd6bfac0e8dd3731280043761c5da3a62a1b9e2cc67f9d575626e9ac7927ee7dc6943bf65b0eb86549a5ac64d48b4f63f7b107eb4520c4fcedafdd7239fc0e4a020f4ca27dbddcb5ce89c158338384c5ba83568cdc7676c1c9192473e4dd4b5cc4fedc4fb20d69489c208ed8ed9fba36087e2e4f0efd00d5cdd5a1fe14226789361f32ded04824b11dfde02b2d5239b1797dac6acda10d7eecc611af95f68c503e11997ccc39a93b3ef064f143b7bd23df5e1b610a0dc2d751b4479de671c61f6a112dcabd75ffe1974ea9819c533add6e2aaadb75c1a50bb820e9c53c0fc59fc8964fae81a1096b61509c34f98360c62a9c6088f2cc7d2e597376c3c6678df36a9664f8ac0574f21c8ce3180719dff65b8f77a8f681a8d3b9537eb533307538c9ea942d9cf6a1efc94af94936c1963b1dd2828716f7b862a2e1fa9336f0c3b4492bfde23c716ce7102ef0294fda80b383d76e74776ca3083808c54c12d584a64e172e321a2047910d4d102d740f652c1820be69872fd70f01b864cba61df10baf64d137368ac223b5e5fadc5c9546f4f57eab5506641cd95bd15884f11b24e2c6044e154daad0bcd4c5065990f14f71c36ba2e39ed83fc6dd0412a5a1876d740891c183cee5711f14080ca09318fff2efa38c1382a96524746b1c7d6cfcdcd0669a1b6b7e57d0dc2bb1bf536e07cbe475159e018ec3e5ec54cc8ff9175a4de2f207d1da8b64b971b21f9358ba6ae467df2b57b977bbd9272a0ec9c680cc63ad10eca3b4b90d5c388e7c81523881f7513d2be5bfb084f1c6abb5863e5af98575b910578a858a5c9ea742c1a28b0ae1456dae55e6edb40d5c8194db1eeca2f55e1f8e985751beaddb187b8ed1a9c68bbec1dc33f4a1a777adb7e6e98955527d3bb0442719684f9520a4ae1d3946f571e8bcb75026580b77afd3835824d85adf590432112912e329eb632d298c1885e0ef661c811a8bb47c99d5f948fb26dc5e04609fab64e10810cbe75bdd00455bbd75e226d0d080dfcb3ef4b60610d30aa2361212826c6ba76a7322648639df96ae565e0304d91c8bc6bda24d614549ea6809f60e825a3b37ff14ecb9bdd3b0c47e2d410d78dbe85e3c1b35f9ad89ca707a5e790ce6052f679d6075d3806629cb99d1d7bbc819866e0904697841bd61fe11cff77cda6760b9f0631747fa7fb1bbbfa01219a95a46f2a8a6122e16980a090e4bebd2a6f1ec62b629e964ace228cca950ed97379ed90a92572e8730c2021f0f45a95609c0fb539740f8a120205aeb9d9b1e32db3e0120b23802af41442a1aa9bb14aa998ca7c4e297dec3bca7ff690e632062b69895b5fb51f428694c519d2c2ef6945e9b3ad34579e6e626cd0a9bf866351ef93294c80712744c27831e36576ceac35e175b42f37124ef9252b619ff97a4bd7788c08880c6547ae97754f479645aac285273ed38ab82b8a6f246895c2b65a8e211226afecc190f6f6f6b2e4886cf029137c1596d501332aa40a2ca6359f2052068be949c11cb8250fd52f6ac007be3273661574a34c618cbafc52dd286d5857e693b46a6452fa73101da0faeb1b7e3f434cf00746ac5b576c0f2fe70ed77339c2ebdc589e038a32b3dbe9c69ca3d814be09c254320d3afe9694409703c719f15ba45fd1a32f67eef7b19d06146ab65bd50b85dcf598ac441cc5f0b6017697a918740b521643ca9e2995af4c71df1c8ba1847338103dd730a0302dd5bee0b2a990042b2810d50d07f7c2f87c7b8ba5c38617229e8bbc091856e78902f14143af9b612d2f2c7048d147aad957303d9b5d68a7bfa73e3e37df6f20d35e3ef80ebb6a416e0870e94dba3ddde949dcccb011dd3194336d627f60fa4cb18943aadafe312078c98620629538d4b44f0857c74619c102907be8651bc3083f15cfa1370bc33b23814ec72376e159a2d37d89557efa9912a6b82feed7af1d6482cefcf20cfdc830b1baa64733f41316d5cf9ea5d48bb864b25ffb3c91944f9486e4175f5aac25e9539ac99156d4b6765c967b95bf676643650317af0fe9136c970735054c004536103d177916c4bd55d574bea006c8dea06ef0ad8e99c1b660445a4b539579312e98abf9b1e450c221223054414eb8453d9f379be80f0ca57bd12d5eb858a49822461eb5b01e5af89225b33ceadb7a17af56ac19ab12503e3bbf89366804e7c30675c681c4cca589f2954da83df86f1876c6a6df4cb98be69d6fac2dbc443a29b2065bb224f792ddb22857f0e0bb73e650b0dbd51a87c09974adca532e40d321490ef6c297fd911350d55b7a63bd32020fad3a7a51929a4aee6589d81877912149ff684825e4cd6102ecefbf250688135f05b3edd0eb3d20ba4c75eff0ab60750226cf18214b66c4ba558da249d3c1c2998da0fc554c5327949fc9efd37c531cd0a8b8fd8bbf2c890e58b386754898f14d7cbc996fe525f3a564ace7f762f2a4363e727ae04174aa7dfce7335f119e3b8560a6e6f74878915924e949459cf31717e1cf9e89e0c0a9ab8f3ce4ba8e642a7418decbf9cde34bae939b4ae503508569c69977b8d5a8ff8aad9fa6c209895afc16b29db165fdd35fb176ff51cdfc9a40869bb3e6437c836318fa51f1425b5dc83dc364ca7bdf1bdfa3699aa07c1ca0157d2023a6623299f1a4ea66b196e892c8874c2da2071d64718ece6a35cefea10a809787348e708393ca323aeaf5a92655b762e7a820307feb4597c9bd572701dce526168309bff170c2a43d36096c62057d0e3433e454a6da8af6c5ad0d0ee443e854c37237a5f5fb11281f6dce1565c289d8a6d53adc910cdd54a6927211c8a2072304cc64f93cc8740252bc831b57569639ae0b759108306114478d0c36888f1f29373dccfeefedf0a07f09", 0x1000, 0x4008000, &(0x7f00000000c0)={0xa, 0x4e22, 0x1, @remote, 0xe24}, 0x1c) preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:08:59 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:59 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000000)='./file0\x00', 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, 0x1c) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:08:59 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x7}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 114.589059][ C1] sd 0:0:1:0: tag#5786 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 114.590460][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 114.599026][ C1] sd 0:0:1:0: tag#5786 CDB: opcode=0xe5 (vendor) [ 114.616369][ C1] sd 0:0:1:0: tag#5786 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 114.625419][ C1] sd 0:0:1:0: tag#5786 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 114.634465][ C1] sd 0:0:1:0: tag#5786 CDB[20]: ba 10:08:59 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:08:59 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x8}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xb}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:59 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 114.645511][ C0] sd 0:0:1:0: tag#5787 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 114.655368][ C0] sd 0:0:1:0: tag#5787 CDB: opcode=0xe5 (vendor) [ 114.661713][ C0] sd 0:0:1:0: tag#5787 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 114.670802][ C0] sd 0:0:1:0: tag#5787 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 114.679844][ C0] sd 0:0:1:0: tag#5787 CDB[20]: ba 10:08:59 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x9}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:08:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e20, 0x401, @mcast1, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x202, 0x3) getsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/hci\x00') [ 114.734666][ C1] sd 0:0:1:0: tag#5792 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 114.744530][ C1] sd 0:0:1:0: tag#5792 CDB: opcode=0xe5 (vendor) [ 114.750869][ C1] sd 0:0:1:0: tag#5792 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 114.759961][ C1] sd 0:0:1:0: tag#5792 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 114.769018][ C1] sd 0:0:1:0: tag#5792 CDB[20]: ba [ 114.831176][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 114.860817][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x300, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x28}}}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x8101) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socket$inet6(0xa, 0x5, 0x7) setsockopt$sock_int(r4, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r6, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r7, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r6, &(0x7f0000000000)='./file0\x00', 0x0) sendto$inet6(r7, &(0x7f0000000300)="bdda13f869ff101a73afb395a983f7f1dfc98483c003d2c7b72d4fae7c4bbf3ffca74547415f4c743364ef1ac1720c78f2197d28ffe2b4551468f8e628c53d1f7d3d48b4c7c584b0b5d3af4869f7f45f65664b9ad5b56c7f17ea15a5e7a9301a6fb0d7ffe34880e2aa090fb0700cd7dbfec6c062c8161b5a75ec06664e4d5e85991aa38e552a87996b1b814dfc5a19b8e3246d92304acc2fca5dda8f5db7e50fc208f4de1a528c7d0afe581240a8fe19aa6999a1a226d6592fcb06959288dc69293e6bea60af0c5215b1943d040ba7060fb33a83b6df9e136c20361be1154e1fb0baf4522cdd5d1758f5beb0452c14b8da9ab84fea9c9ef60879600048dacdfa66a58f48a9af6c39d0f20e7cef3cbd2c8400bc0439335f0b6c47335f55a0ab569013b60a0221319e9d6a40410dccbec18d98b073af22fd4732d9b2278d95e9f6d24562292dce98747244a9ec87852aaa6947b5076aa3519dbd8d7e617b1244a4dd28b24850ca150b4254bc70f33606de40f00eddeb57378c3ab1b9d8ef9da483d25299a5ad86f569fed4dd77b7736b8a635d85279a1ef55ec71ae9f5aa111c7fbce9f14e722aea69d22b5532b0caa1a094373a1af504686ce3c792f4c81f1ec1fceef9638efb89e1913e4e54fc2a11ebc04860a1dfe58dbf26b955c5675703e87c57dac551514a122d02b1a6c628e118c1bb813a3acf682c842f10f4b5f75c8d6090470d71444c993bdb2ae3f3a23e14af47f90ee03bb4beb0d6bde738cf74d0b89b2f9c5243d33abd20140b63706f2c67c2d55b68c71b58d636cb8b92325717b1266b1711b14242b8662a04814d362d3483c2fce89aecb28e9a7ae831bb09e8857c3f1e077abdc54c712228e47203246d61ac724b2391cd39910338bbb376028685384f3d37cb6af129cb7a4afb15969c507a998861db0ad2f6ba053df592e8c7ac124ded1eceab32776253ec9f7182e50884c703dfaa0154e8d03cdbe1e510516b361d6275e71375f3780201a0fb1d88bc50c279a955ffcd98a49ca15bb0ab0664d6b5cb667ff8daa80752208110e70ce9e90b101e81157008920e5dac37a420b69a9c8cc64c722add41519db31006f6fa31ea33479d7c654270bd6bcf0c68531b315abded8eca704413c2f2e0d68383f21ee67cf056405af43bf520b28f1fe75b140238c5df744e95e610b8a7ea32b16a7656b4afa84bbb186673df4f479dd3c4cb6bac55d4bca49c166a25efe88ee94181795166852a0d80d178c98fc99438246caf947dc12f3879d310057a74039a36f8e7723a7ffe44a351581033f2e8dcff79a86720d54e4f7be3418b679ffb307db47cf03ebb8c39b0d8de6531444fab9750d59119ebec561058c473e1c026005f4922749a0221c42fcb68a0a523cd6f2162fd486f1354d3aa105b100ce514088b8b70d3c1c54612c49eb2643d00cdd1fd375c35fa885340c53a43d9ff4dcbdb5ad18fa0f533303abcd20a70bb750cf4f05ebfe5bc282fbab3966de87dbbcdb0b3bc10404aadb584c50a7b1af5c852da5eb87038c60384430c9b021e02ca51db68954fd1a1f163a35e899b0714344bc2f977e79a0049e427e6fb5a161d64f7e5ccd3aca76113849262834f3999bfa02919ded3bc25a1434a218c34e838bc30560d7fd576b0d59865030566425c91252a064d0998b47c38646ea8d3a64760276c9efc624253d264e8c96315fd955024786f9bbbf7ad0408fe5cd8bc516956b2b1570a9cf823e7247e59481477e9e446ab38ae86594004f34b90aa1563b63bc01de9baea5f2479e54a8db04d50a3f5adc01bd9798ea26cf7be75178a52d5bfe6d555c43b3bdffcdc3c10021624bf0f9e37117833048808a923b2bfd3aa6bd8fdc845b3d7693bbbf6c75e5038c89828c13287688877bf43875d8b182bfc2adcd43cc46ac88fb9db748cd51bf9ae55a6eb07750522161e131c41e5b0264f181a2b46f4e3ab2f387caf2697a4672a2386b7121627919a362b83c8a62475300f1c439348ff5ac31365fb388617ade77858a38b6b10b89a5624232d4c14bd0d2d8f428fa15c02b940003850cbe28722eee433eb3809a8b716107701ff338804e6233a66f9e8ed227dd71188d0d4a14c1afd8ed61d069e19ba52209e51694d8eebed7f7ca41f20c0d93e49979ce9ba48569f17c09692220a3573c8602ecf3cb4f09e252a7497c9b8492fa6a896547dbc96256b7e252a565526cc52ec95d575f8e5e50ffd8033edce07a9cdd9ee1a6078ce39481e2b42fc477c8f8fa1d7ba6145aead304dbef73c493d06554cfb3d7c68fdf7aed273209fc2170d1c3ac619f5f8fb218145d804a518494f4ed913ef20e2c4240f1ca4b4c86757673662bd048ce4e6f0376bce2767dc47ebb049d3223e6bf962f7a14bb93721c697a808d48835afb1c9330c21bae2598cb9c782b7e71cd14279523b0789f7030325271f4c26f8a586e5ca00bfe4b109ca9ba3d9844e6d22c4874d5344cda513c3c122331404bdda084a549c56f37d4fef52b823a3b8acaa20111785caadb8d53d11a3b83f708f02a97d0bb6bcf8d476dd995b92c443cdd205141795c6308f77bc522d028153a5e71249d6c388c223793c4a4aab35a94d5fdc2b9148ac078d2ed3faf55e83047e16b48e5632d915a121c061da1d52240a043b5c6d4c263786deb635c4cb64868f5228e3cd0397af5b7fbef3492c3cdd3eb5079a5993be0c092d21f3720098e69a8cbbc2ed54cf7c1d04234e2e95b3f6cd250ca722bed3579f271fcf483b61fe1e6948ce9ebb0b1448f1fd3a237e24cd378b559cd1a81144d0016da9fbac32dd3734ec6dbf461fb2b82f7fb24bbec3b3501b2b3ef7e028507fe7354e644afefa7f7d3f071a96529e90b878bffaa84bc1ec3632acd6bfac0e8dd3731280043761c5da3a62a1b9e2cc67f9d575626e9ac7927ee7dc6943bf65b0eb86549a5ac64d48b4f63f7b107eb4520c4fcedafdd7239fc0e4a020f4ca27dbddcb5ce89c158338384c5ba83568cdc7676c1c9192473e4dd4b5cc4fedc4fb20d69489c208ed8ed9fba36087e2e4f0efd00d5cdd5a1fe14226789361f32ded04824b11dfde02b2d5239b1797dac6acda10d7eecc611af95f68c503e11997ccc39a93b3ef064f143b7bd23df5e1b610a0dc2d751b4479de671c61f6a112dcabd75ffe1974ea9819c533add6e2aaadb75c1a50bb820e9c53c0fc59fc8964fae81a1096b61509c34f98360c62a9c6088f2cc7d2e597376c3c6678df36a9664f8ac0574f21c8ce3180719dff65b8f77a8f681a8d3b9537eb533307538c9ea942d9cf6a1efc94af94936c1963b1dd2828716f7b862a2e1fa9336f0c3b4492bfde23c716ce7102ef0294fda80b383d76e74776ca3083808c54c12d584a64e172e321a2047910d4d102d740f652c1820be69872fd70f01b864cba61df10baf64d137368ac223b5e5fadc5c9546f4f57eab5506641cd95bd15884f11b24e2c6044e154daad0bcd4c5065990f14f71c36ba2e39ed83fc6dd0412a5a1876d740891c183cee5711f14080ca09318fff2efa38c1382a96524746b1c7d6cfcdcd0669a1b6b7e57d0dc2bb1bf536e07cbe475159e018ec3e5ec54cc8ff9175a4de2f207d1da8b64b971b21f9358ba6ae467df2b57b977bbd9272a0ec9c680cc63ad10eca3b4b90d5c388e7c81523881f7513d2be5bfb084f1c6abb5863e5af98575b910578a858a5c9ea742c1a28b0ae1456dae55e6edb40d5c8194db1eeca2f55e1f8e985751beaddb187b8ed1a9c68bbec1dc33f4a1a777adb7e6e98955527d3bb0442719684f9520a4ae1d3946f571e8bcb75026580b77afd3835824d85adf590432112912e329eb632d298c1885e0ef661c811a8bb47c99d5f948fb26dc5e04609fab64e10810cbe75bdd00455bbd75e226d0d080dfcb3ef4b60610d30aa2361212826c6ba76a7322648639df96ae565e0304d91c8bc6bda24d614549ea6809f60e825a3b37ff14ecb9bdd3b0c47e2d410d78dbe85e3c1b35f9ad89ca707a5e790ce6052f679d6075d3806629cb99d1d7bbc819866e0904697841bd61fe11cff77cda6760b9f0631747fa7fb1bbbfa01219a95a46f2a8a6122e16980a090e4bebd2a6f1ec62b629e964ace228cca950ed97379ed90a92572e8730c2021f0f45a95609c0fb539740f8a120205aeb9d9b1e32db3e0120b23802af41442a1aa9bb14aa998ca7c4e297dec3bca7ff690e632062b69895b5fb51f428694c519d2c2ef6945e9b3ad34579e6e626cd0a9bf866351ef93294c80712744c27831e36576ceac35e175b42f37124ef9252b619ff97a4bd7788c08880c6547ae97754f479645aac285273ed38ab82b8a6f246895c2b65a8e211226afecc190f6f6f6b2e4886cf029137c1596d501332aa40a2ca6359f2052068be949c11cb8250fd52f6ac007be3273661574a34c618cbafc52dd286d5857e693b46a6452fa73101da0faeb1b7e3f434cf00746ac5b576c0f2fe70ed77339c2ebdc589e038a32b3dbe9c69ca3d814be09c254320d3afe9694409703c719f15ba45fd1a32f67eef7b19d06146ab65bd50b85dcf598ac441cc5f0b6017697a918740b521643ca9e2995af4c71df1c8ba1847338103dd730a0302dd5bee0b2a990042b2810d50d07f7c2f87c7b8ba5c38617229e8bbc091856e78902f14143af9b612d2f2c7048d147aad957303d9b5d68a7bfa73e3e37df6f20d35e3ef80ebb6a416e0870e94dba3ddde949dcccb011dd3194336d627f60fa4cb18943aadafe312078c98620629538d4b44f0857c74619c102907be8651bc3083f15cfa1370bc33b23814ec72376e159a2d37d89557efa9912a6b82feed7af1d6482cefcf20cfdc830b1baa64733f41316d5cf9ea5d48bb864b25ffb3c91944f9486e4175f5aac25e9539ac99156d4b6765c967b95bf676643650317af0fe9136c970735054c004536103d177916c4bd55d574bea006c8dea06ef0ad8e99c1b660445a4b539579312e98abf9b1e450c221223054414eb8453d9f379be80f0ca57bd12d5eb858a49822461eb5b01e5af89225b33ceadb7a17af56ac19ab12503e3bbf89366804e7c30675c681c4cca589f2954da83df86f1876c6a6df4cb98be69d6fac2dbc443a29b2065bb224f792ddb22857f0e0bb73e650b0dbd51a87c09974adca532e40d321490ef6c297fd911350d55b7a63bd32020fad3a7a51929a4aee6589d81877912149ff684825e4cd6102ecefbf250688135f05b3edd0eb3d20ba4c75eff0ab60750226cf18214b66c4ba558da249d3c1c2998da0fc554c5327949fc9efd37c531cd0a8b8fd8bbf2c890e58b386754898f14d7cbc996fe525f3a564ace7f762f2a4363e727ae04174aa7dfce7335f119e3b8560a6e6f74878915924e949459cf31717e1cf9e89e0c0a9ab8f3ce4ba8e642a7418decbf9cde34bae939b4ae503508569c69977b8d5a8ff8aad9fa6c209895afc16b29db165fdd35fb176ff51cdfc9a40869bb3e6437c836318fa51f1425b5dc83dc364ca7bdf1bdfa3699aa07c1ca0157d2023a6623299f1a4ea66b196e892c8874c2da2071d64718ece6a35cefea10a809787348e708393ca323aeaf5a92655b762e7a820307feb4597c9bd572701dce526168309bff170c2a43d36096c62057d0e3433e454a6da8af6c5ad0d0ee443e854c37237a5f5fb11281f6dce1565c289d8a6d53adc910cdd54a6927211c8a2072304cc64f93cc8740252bc831b57569639ae0b759108306114478d0c36888f1f29373dccfeefedf0a07f09", 0x1000, 0x4008000, &(0x7f00000000c0)={0xa, 0x4e22, 0x1, @remote, 0xe24}, 0x1c) preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:09:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xc}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:00 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:00 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:00 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x490100, 0xcd5d8e87923098e1) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000000c0)={'security\x00', 0x2, [{}, {}]}, 0x48) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x2) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000040)=0xfffffffe, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x200}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000002c0)={0x8}, 0x4) renameat2(r5, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f0000000000)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x29}, @in=@broadcast, 0x4e21, 0x400, 0x4e24, 0x81, 0xa, 0x20, 0x0, 0x2f, r6, 0xee00}, {0x5a, 0x1, 0x2, 0x3, 0xff, 0x10000, 0x7fffffff, 0x2}, {0x80, 0x3, 0x0, 0xff}, 0x7ff, 0x6e6bb2, 0x2, 0x1, 0x0, 0x2}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4d3, 0x32}, 0x0, @in=@broadcast, 0x3503, 0x1, 0x3, 0x80, 0x0, 0xd28}}, 0xe8) syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') 10:09:00 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xd}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:00 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xb}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYBLOB="000000000000b0ca060000000000000009000000000000000100000000000000cf00000000000000000200000000000007000000ff7f00009000000035f9ffff050000000049d93ca6a7b32bd8295fcbfc1bb7db00000007000000000000000600000000000000ff030000000000003000"/151]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000507c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000509c0)={{0x0, 0xc9, 0x2, 0x3, 0x80, 0x5, 0x10001, 0x8, 0xcf08, 0x7, 0x7, 0x21dc, 0x401, 0x4, 0xffffffffffffff43}}) r5 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r9, 0xc0709411, &(0x7f0000000100)=ANY=[@ANYRES64=r6, @ANYBLOB="000000000000b0ca060000000000000009000000000000000100000000000000cf00000000000000000200000000000007000000ff7f00009000000035f9ffff050000000049d93ca6a7b32bd8295fcbfc1bb7db00000007000000000000000600000000000000ff030000000000003000"/151]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {}, {}, {r7}, {r7}, {}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7, r8}, {}, {}, {}, {}, {0x0, r8}, {r7}, {0x0, r8}, {0x0, r8}, {}, {}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {0x0, r8}, {r7}, {}, {0x0, r8}, {}, {0x0, r8}, {r7}, {}, {}, {r6, r8}, {}, {r6}, {}, {}, {r6}, {}, {r7}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {r6, r8}, {}, {}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {r7}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7, r8}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {}, {r7}, {}, {}, {0x0, r8}, {}, {}, {r7, r8}, {r6}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {}, {r7}, {0x0, r8}, {}, {r6}, {}, {}, {}, {}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r7}, {}, {r6, r8}, {}, {0x0, r8}, {}, {}, {}, {r7}, {}, {}, {r6}, {r7}, {}, {r7}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {0x0, r8}, {}, {}, {}, {}, {0x0, r8}, {r6}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {r7}, {r6}, {r7}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000519c0)={0xce9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7, "608368cbf21f6f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000529c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000052bc0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x20, "0f19e51e88291e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053bc0)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {r4, r8}, {}, {}, {}, {}, {0x0, r10}, {r11}, {0x0, r12}], 0x1, "173e637c5f0935"}) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) [ 115.499254][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:00 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xe}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 115.561532][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:01 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xc}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="6511136e49fc40b4d7786e96b9a032d0", 0x10) listen(r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) connect(r1, &(0x7f0000001240)=@un=@file={0x1, './file0\x00'}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8804, &(0x7f000031e000)={0xa, 0x4e22, 0x7fff, @local}, 0x1c) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="f2b118bb9eb01384b9c7d067427d9c8a", 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r2, 0x5000940a, &(0x7f0000000240)={{r3}, "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"}) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:01 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x10}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYBLOB="000000000000b0ca060000000000000009000000000000000100000000000000cf00000000000000000200000000000007000000ff7f00009000000035f9ffff050000000049d93ca6a7b32bd8295fcbfc1bb7db00000007000000000000000600000000000000ff030000000000003000"/151]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000507c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000509c0)={{0x0, 0xc9, 0x2, 0x3, 0x80, 0x5, 0x10001, 0x8, 0xcf08, 0x7, 0x7, 0x21dc, 0x401, 0x4, 0xffffffffffffff43}}) r5 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r9, 0xc0709411, &(0x7f0000000100)=ANY=[@ANYRES64=r6, @ANYBLOB="000000000000b0ca060000000000000009000000000000000100000000000000cf00000000000000000200000000000007000000ff7f00009000000035f9ffff050000000049d93ca6a7b32bd8295fcbfc1bb7db00000007000000000000000600000000000000ff030000000000003000"/151]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {}, {}, {r7}, {r7}, {}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7, r8}, {}, {}, {}, {}, {0x0, r8}, {r7}, {0x0, r8}, {0x0, r8}, {}, {}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {0x0, r8}, {r7}, {}, {0x0, r8}, {}, {0x0, r8}, {r7}, {}, {}, {r6, r8}, {}, {r6}, {}, {}, {r6}, {}, {r7}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {r6, r8}, {}, {}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {r7}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7, r8}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {}, {r7}, {}, {}, {0x0, r8}, {}, {}, {r7, r8}, {r6}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {}, {r7}, {0x0, r8}, {}, {r6}, {}, {}, {}, {}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r7}, {}, {r6, r8}, {}, {0x0, r8}, {}, {}, {}, {r7}, {}, {}, {r6}, {r7}, {}, {r7}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {0x0, r8}, {}, {}, {}, {}, {0x0, r8}, {r6}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {r7}, {r6}, {r7}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000519c0)={0xce9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7, "608368cbf21f6f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000529c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000052bc0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x20, "0f19e51e88291e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053bc0)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {r4, r8}, {}, {}, {}, {}, {0x0, r10}, {r11}, {0x0, r12}], 0x1, "173e637c5f0935"}) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:01 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c010000100013070000000000000000fe88000000000000000000c419240266c716d50100000000000000000000000000000000000000000000000000000000288d5882c86ceb902f5cc409989ae6c8c5fb544349b896333160eebeb9744dd90aa01b4fd2bc57462d7844ca1b3be75207082fd5da643d49d0a69cd119692c9ba5ff52e27d998b962dd9c66865476acdf1893e29e64389aa13ca94e9d821f4b16f3d6d9be58d7abeaf157e608e770c15342fc91e3af52c8c0f1c670f86b4181640b9506275d8803d44c18219bbd18ec47d98a9b1eef6084de5a8a111824e00d667f951dbf094a5a0980455ff738a440000bc262ea73c860ff96ae5e491a03dc33cd2e820efbacf48777fd49deb91c7037740efaf7a8632cefedc10926d652a4560c909229094403d276af1897c1d2ce8efee6ae6900ed086430e3836d475ebe53c1992ff656ef6cf29ae0055c48ee4a57c20b675e581a0a962238293fdc3aaef55ea603ada91966b8e908196ab2df6a752426c32de7210fa189b63a9158eb1bae4b850d3a9368abbc7dd5ce901f199b1466b68257f580c6bc4b625a2eacfd0571454f4b3b7702e3cb86c10198354a36af826c98ec1f87aada58c768bffe69318095e18f5a06fd5ff6f074676accda9801f5f530cfb2197ad58afad8ced71b9bd305314a1c22bc5cb8341f42d0ffddaf557e2c46c2af3768b88b174a9f4b44ce125496138bbeff2f269fe9f48e3fd17072dd841e09e387629e3ded0047ad19b5b46dedf569430494636477120b93a473d566b92514b8958b307b6b2f260b3eab7db2c70bfe543a4611b52452810a963c1989bf4826d92cb0758f7d9d7652893400c824139225276c544cef8079f60c963c417a97ef1e8e012a5d8b876116a36f5d966042b", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000049000200656362286369706865725f6e756c6c290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000042000000"], 0x13c}}, 0x0) listen(r1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x280000, 0x0) connect(r3, &(0x7f00000002c0)=@x25, 0x80) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000000)="6843a0fc35b4168895b41b207c3953f45569ecbcd5f1ed6919a7eee5977da31a6119114000e9538140f294fa82e7e0c5ae1feefc689a230cdea4d4de302f7b3207c8aba8190f102bd2c772e49487c64b", 0x50) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r6, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) [ 116.346542][T12954] EXT4-fs: 12 callbacks suppressed [ 116.346561][T12954] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 116.365701][T12957] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x11}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xd}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 116.447942][T12972] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. [ 116.453316][T12968] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xe}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x14}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 116.517940][T12979] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 116.536990][T12972] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 10:09:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000000)={0x62, 0x2, '\x00', [@hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x17}}]}, 0x20) preadv(0xffffffffffffffff, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x10}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x85}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 116.601245][T12996] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 116.626610][T13003] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:01 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x15) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') sendto$inet6(r2, &(0x7f0000000240)="d84466add911bc119ff73cd0bcc3c01d3b31a0aa714f96eeb8d5e8ebd17ae127131baea7443945aad669c8cc73f6c3af86daa6a2e20aeaaae6fa3f4ea6405a654c18de94d193bb8ecc1bc97ce22604ee5bdfb99eedf6d7a4e09a488a70ffe0aa46a93594fb3d8be5982cbfc3dde1999d3afab0461254508681689dee3a6617ca78ab391770916dff5ace7f99e78852ec5a623fe992d4a7877cbc250ed81a9833a1068a2f0832fb0f24180293429e071f3abd38e89f3bff08f1bfd463e6cbe683c5cda28374b2d51c2d952d74d88ea3a2312e4da78556ad17a28c2c7260d8523a896a34c3fa28e9b154", 0xe9, 0x8000, 0x0, 0x0) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) [ 116.645212][T12998] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:01 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x11}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x300}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 116.692136][T13015] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:01 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000010, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') r3 = openat(r2, &(0x7f00000001c0)='./file0\x00', 0x420480, 0x15) sendfile(r3, r1, &(0x7f0000000200)=0x1, 0x8) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) r4 = signalfd4(r1, &(0x7f0000000000)={[0x9b]}, 0x8, 0x80000) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0xfffffffffffffff7) [ 116.746333][T13027] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x500}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 116.791865][T13035] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:01 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x600}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x14}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:01 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:01 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x700}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000001c0)=@v1={0x1000000, [{0xfffffffc, 0x9}]}, 0xc, 0x3) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x0) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') write(r4, &(0x7f0000000400)="2b93b2aa61919ef667cd65c66e0e4d38bd1c9ac3894e41b3ba9893749e15e3c72dc375c4adec0af018ba7f8c4880ed196f585662747bebe55e8e49697f1ed3868335f36d1150e2c68ebcf01979a1b0278823bb0d7453b99afd16d7bf884eab50932191a82a5de3a1bb4516232f7aefc6d7b343e3f454d02e26811a0dd43f35ee157b45726b6c3e53b3f4f2acf6bc4b053785efa2449587c762f3865fe83ba68405d21ba2d295ec16dfb80f547485e94b6a93e3f690f9ce4e1c0807995d5dfbc3e55f210413eb91732accc31d62e7f4d9603f412c36438199d009a66259a1", 0xde) preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x9d}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x900}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x300}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e23, 0xaa7, @mcast2, 0x80000000}, {0xa, 0x4e23, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfff}, 0xb4, [0x3, 0x8, 0x1, 0x2, 0x1, 0x7, 0x4, 0x8]}, 0x5c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x500}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xb00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x600}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xc00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0xec) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) pread64(r4, &(0x7f0000000000)=""/48, 0x30, 0x100000001) preadv(r3, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xd00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x700}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xe00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x900}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1100}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xb00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1200}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x6, 0x0, "c8c569ae62ac0f97ad33d75366e3a4347b048f272f95d15d2433550a0b9bdbb2ae8ebe5d57728a01548a1cbf9f01f355962869936aed8b60cdaf9c31d4f513830ed7e92dc144ee06473cb35d2779b11a"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xc00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1400}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xd00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, "5b1cef4f9a2c5808", "3971d030fe66f2c86c33003f098d6f8c", "c726d87f", "365b6dbbc1d215c6"}, 0x28) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xe00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2000}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000200)={0x2, 'vlan0\x00', {0x1ead}, 0x1}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x121000, 0x0) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r6, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000240)=0x791, 0x4) 10:09:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1100}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x8500}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:02 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 117.930746][ C1] scsi_io_completion_action: 55 callbacks suppressed [ 117.930777][ C1] sd 0:0:1:0: tag#5766 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 117.933978][ C0] sd 0:0:1:0: tag#5767 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 117.937534][ C1] sd 0:0:1:0: tag#5766 CDB: opcode=0xe5 (vendor) [ 117.948905][ C0] sd 0:0:1:0: tag#5767 CDB: opcode=0xe5 (vendor) [ 117.958700][ C1] sd 0:0:1:0: tag#5766 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:09:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1200}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 117.965025][ C0] sd 0:0:1:0: tag#5767 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 117.971363][ C1] sd 0:0:1:0: tag#5766 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 117.980797][ C0] sd 0:0:1:0: tag#5767 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 117.989805][ C1] sd 0:0:1:0: tag#5766 CDB[20]: ba [ 117.998822][ C0] sd 0:0:1:0: tag#5767 CDB[20]: ba 10:09:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = gettid() tkill(r2, 0x3d) ioprio_get$pid(0x3, r2) r3 = syz_open_procfs(r2, &(0x7f0000000200)='wchan\x00') preadv(r3, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:03 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1400}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 118.049180][ C1] sd 0:0:1:0: tag#5769 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 118.059056][ C1] sd 0:0:1:0: tag#5769 CDB: opcode=0xe5 (vendor) [ 118.065419][ C1] sd 0:0:1:0: tag#5769 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 118.074813][ C1] sd 0:0:1:0: tag#5769 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 118.083871][ C1] sd 0:0:1:0: tag#5769 CDB[20]: ba 10:09:03 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 118.146058][ C0] sd 0:0:1:0: tag#5775 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 118.155917][ C0] sd 0:0:1:0: tag#5775 CDB: opcode=0xe5 (vendor) [ 118.162267][ C0] sd 0:0:1:0: tag#5775 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 118.164668][ C1] sd 0:0:1:0: tag#5776 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 118.171307][ C0] sd 0:0:1:0: tag#5775 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 118.171322][ C0] sd 0:0:1:0: tag#5775 CDB[20]: ba 10:09:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') socket$inet6(0xa, 0x5, 0x1000) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:03 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2000}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 118.181143][ C1] sd 0:0:1:0: tag#5776 CDB: opcode=0xe5 (vendor) [ 118.201564][ C1] sd 0:0:1:0: tag#5776 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 118.210669][ C1] sd 0:0:1:0: tag#5776 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 118.219802][ C1] sd 0:0:1:0: tag#5776 CDB[20]: ba [ 118.251325][ C0] sd 0:0:1:0: tag#5778 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 118.261175][ C0] sd 0:0:1:0: tag#5778 CDB: opcode=0xe5 (vendor) [ 118.267538][ C0] sd 0:0:1:0: tag#5778 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 118.276627][ C0] sd 0:0:1:0: tag#5778 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 118.285005][ C1] net_ratelimit: 14 callbacks suppressed 10:09:03 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x0) recvfrom$inet6(r2, &(0x7f0000000240)=""/4096, 0x1000, 0x1, &(0x7f0000000000)={0xa, 0x4e22, 0xffffff01, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x5}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) [ 118.285020][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 118.285661][ C0] sd 0:0:1:0: tag#5778 CDB[20]: ba 10:09:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 118.375921][ C1] sd 0:0:1:0: tag#5787 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 118.385794][ C1] sd 0:0:1:0: tag#5787 CDB: opcode=0xe5 (vendor) [ 118.386886][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 118.392157][ C1] sd 0:0:1:0: tag#5787 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 118.392177][ C1] sd 0:0:1:0: tag#5787 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 10:09:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x9d00}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 118.403316][ C0] sd 0:0:1:0: tag#5786 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 118.412202][ C1] sd 0:0:1:0: tag#5787 CDB[20]: ba [ 118.421211][ C0] sd 0:0:1:0: tag#5786 CDB: opcode=0xe5 (vendor) [ 118.442474][ C0] sd 0:0:1:0: tag#5786 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 118.451515][ C0] sd 0:0:1:0: tag#5786 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 118.460553][ C0] sd 0:0:1:0: tag#5786 CDB[20]: ba 10:09:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) 10:09:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 118.577272][ C1] sd 0:0:1:0: tag#5800 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 118.587130][ C1] sd 0:0:1:0: tag#5800 CDB: opcode=0xe5 (vendor) [ 118.593502][ C1] sd 0:0:1:0: tag#5800 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 118.602540][ C1] sd 0:0:1:0: tag#5800 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 118.611575][ C1] sd 0:0:1:0: tag#5800 CDB[20]: ba 10:09:03 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 1: mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 118.672680][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f00000001c0)) ioctl$SG_IO(r2, 0x2285, &(0x7f0000001400)={0x52ffeb5fe06742c, 0xfffffffffffffffd, 0x1000, 0x8, @buffer={0x0, 0x92, &(0x7f0000000240)=""/146}, &(0x7f0000000300)="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", &(0x7f0000001300)=""/251, 0x7fffffff, 0x4, 0x1}) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000016c0)=0x3, 0x2) renameat2(r6, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f0000000000)='./file0\x00', 0x0) sendto$inet6(r6, &(0x7f0000001500)="a7443ba14358a21fc6f4d323dc6b328c5c883e8e824d6f48dbbf31d05a266d907210f05616423675ff8c6438fba5d367239d7da65b4020d66f30996d8e6fbbdfe88680067373d6b901b6a2739461251232a527677e7de88cf41439fd37c290502efba8cfa8155e8399dc524bc10330579e503ac8ac86c3f3271fce068bba347839545ed0ac2ccbed79d29144a8fa5d247abcf7499814d301e0cb67eb4e1507ee965ef6737fb3a924b16b5bce8999d8397693ebef8551849abf35fc699780731d017df60a918224a95e30f75ec9b3848bae772eb38011cb20a16eeb62b0dbb1392e4634d824d1274942bd2d3f4e2046968541c9c9", 0xf4, 0x4000, &(0x7f0000000040)={0xa, 0x4e20, 0x5d, @mcast2, 0x2}, 0x1c) fstat(r2, &(0x7f0000001480)) 10:09:03 executing program 1: mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:03 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 1: mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 1: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 118.897953][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x8, 0xed, 0x6, 0x0, 0x80, 0x81, 0xd, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x10800, 0x1, 0x2, 0xf, 0x5, 0x0, 0x1ff, 0x0, 0x8d, 0x0, 0x29}, 0xffffffffffffffff, 0x4, r2, 0x9) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:04 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 3: mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 1: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 3: mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 1: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 119.061764][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 119.162455][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast2, @in=@multicast2, 0x4e23, 0x0, 0x4e23, 0x2, 0xa, 0x20, 0x0, 0x3c, 0x0, 0xffffffffffffffff}, {0x7, 0x0, 0x3, 0x7, 0x0, 0x7, 0x2, 0x3}, {0x7ff, 0x9, 0xffffffffffffffff, 0x9a7}, 0x800, 0x6e6bb6, 0x1, 0x0, 0x1}, {{@in=@multicast2, 0x4d6, 0xff}, 0x2, @in6=@remote, 0x3505, 0x0, 0x1, 0x5, 0x80000000, 0x7, 0xfffffffb}}, 0xe8) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:04 executing program 2: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 3: mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 3: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 2: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 119.273135][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 3: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 2: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = signalfd(r0, &(0x7f0000000040)={[0x400]}, 0x8) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x561000, 0x0) r3 = accept4(r0, &(0x7f0000000140)=@ieee802154={0x24, @long}, &(0x7f0000000080)=0x80, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22, 0xfffffffc, @loopback, 0xfffffffe}, 0x1c) sendto$inet6(r0, &(0x7f0000000240)="deea58a7040f4e10e8ced40711068d2191db0194e059650c36dc8c4f75c079891cbfb28365ef8da8d7c24d9808219447115f9f217d34bba55b91b90bf27ce3ab3bafc298a0407dbc052c60617f1e9a698c4ce0cd1ce98e4c0b9e9c7ab32e985c8ea77225be1b4b024af1ed63c7bc6314c3e54d40b30943b380c64a696246b19bb9af9814da3a5ed299aaae9a213e593b7083e3b32b302538393c2e34795d7953d39e39c3c4bd3ee372eb", 0xaa, 0x4000080, 0x0, 0x0) listen(r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r6, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x48002, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000000000), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 119.386502][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:04 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 3: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c010000100013070000000000000000fe8800000000000000000000000000017f00000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x13c}}, 0x0) connect(r1, &(0x7f0000000240)=@nfc={0x27, 0x0, 0x0, 0x7}, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x3, @private0, 0x7}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 119.546222][T13598] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. [ 119.576514][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:04 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 119.665565][T13626] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. [ 119.687447][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:09:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') sendto$inet6(r1, &(0x7f0000000240)="5ffe2d92e0cc14505f51dda7c09f107be668f6658ce0f6b763d9c7955000cb9bf572c5f9c13fd11a8634ebad60fb6db46062448efec6509b6c2fd644ccc00bf908f2963b9a11784c5b5856e4846e678724149202278883a150b7feb42c4941c9031864ba7482a204fb143087b050e80b2f383952a33be1de20f21c6d093c2d899af8e4b2f28c1ad63e16582ccc4c66597659e7092d355c49803d9b228413eafce08596419a465d45cf75314cced98f89980b0b0027add619be6454f53b40ba97bd851f5711c6524835835eb04a9fb91d9dd0c3469f39649beff9af772db806c400fa9a028f53b32524a65b64fc81e1168a3b", 0xf2, 0x9000, &(0x7f0000000000)={0xa, 0x4e21, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x81}, 0x1c) preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:04 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540), 0x0, 0x2, 0x0) 10:09:04 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:04 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:04 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x6, &(0x7f00000001c0)=0x101, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x222040, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) setsockopt$inet6_MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e20, 0x1, @mcast1, 0x4cf}, {0xa, 0x4e21, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, 0x1ff, [0x1, 0x8, 0x7, 0x7, 0x3, 0xffff, 0x7f]}, 0x5c) preadv(r4, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x480042, 0x1a1) sendmsg$NL80211_CMD_LEAVE_OCB(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000428b57000fedbdf256d00dc000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) sendmsg$NL80211_CMD_RADAR_DETECT(r2, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x5c, 0x0, 0x300, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x3c9c}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x18}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000090}, 0x2000c004) listen(r1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r8, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x4000000) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e24, 0x400, @private0}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000280)=0x8, 0x4) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) 10:09:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xcab5975f77439a2e}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x20, r4, 0x100, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7b}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x8810}, 0x2004) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r6, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r7, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r6, &(0x7f0000000000)='./file0\x00', 0x0) sendto$inet6(r7, &(0x7f0000000000)="686eeb4eeebba030b23ad21d4a783be7bbbe4cd909225a5bbc881923f8c614846c327ec276736cf369c3260a6dae087f0e5f0d2ead965632f0baddd09761da5bca9d631fa884be53a30c79e8", 0x4c, 0x890, &(0x7f00000001c0)={0xa, 0x4e22, 0xffffffff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000480)=0x1, 0x4) preadv(r5, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) [ 120.805744][ C0] sd 0:0:1:0: tag#5761 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 120.815624][ C0] sd 0:0:1:0: tag#5761 CDB: opcode=0xe5 (vendor) [ 120.821979][ C0] sd 0:0:1:0: tag#5761 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 120.831046][ C0] sd 0:0:1:0: tag#5761 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 120.840098][ C0] sd 0:0:1:0: tag#5761 CDB[20]: ba 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) 10:09:05 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000240)=0x2, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff}) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0xffff, @remote, 0x80000000}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, 'B'}}]}, 0x13c}}, 0x0) preadv(r4, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/85, 0x55}, {&(0x7f0000000300)=""/172, 0xac}], 0x2, 0x9, 0x6) preadv(r3, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) 10:09:06 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) 10:09:06 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:06 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) 10:09:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000240)="7c115a4bc044b970840a1b34d1d8497e68a198f37c840babc0478aab37cf49c67b3655a27a9aa07279b80e84b0fbc8c44e39dc9a201a8bd951e289a0cfdcd1efd5f59de83d70d38570935f679ccdb6d8b57381a07b98c1143d4989fafb6caf1c5566fde5cb9152dde42797e14f1cf8d8381b9955a5f69d5fb3014d4273282e86583859f37046e4143ac48e274e3fbc5dcd70750310ba5bbead571a69ca19acdf90957b5f8a225312ae628b25362cd870d30524b24f78487306e8565027fcbcf9ae22a07ae41b9b2f02d87c9319532e98ff30653c3feb05b49e75f464e4094d171adf177e0a754a0a596e3ce4412c77db01270c76f0b776", 0xf7) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) 10:09:06 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) 10:09:06 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:06 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) 10:09:06 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:06 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @loopback, 0xa211}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000006, 0x4000010, r2, 0xc4bd2000) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) recvfrom$inet6(r3, &(0x7f00000002c0)=""/103, 0x67, 0x40000100, &(0x7f0000000040)={0xa, 0x4e22, 0x7caf, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffff}, 0x1c) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r5, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r4, 0x40043311, &(0x7f0000000000)) 10:09:06 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, 0x0) 10:09:06 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:06 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x74000000) 10:09:06 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00', 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = gettid() ioprio_get$pid(0x3, r5) r6 = clone3(0xfffffffffffffffd, 0x0) r7 = syz_open_procfs(r6, &(0x7f00000000c0)='coredump_filter\x00') preadv(r7, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:09:06 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:06 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @private0}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/237, 0xed}], 0x1, 0x200000000000004, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) sendmsg(r3, &(0x7f00000008c0)={&(0x7f0000000240)=@l2tp={0x2, 0x0, @local, 0x3}, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)="952ce63b11fdec540e2032e2cd05a730d1b919a78d520ac361c7d37085c6ac54df5557b371f66123d0541bb8e176f5c6e3b6c4691042292a87948010457ca4a691a7fe308c3821f34ea9bc9c122b7315d2c48104e4a751e9f07b6bddec80d781490b90903d2aeebf775cf2d3a99c3a16d466e287783972f2649013471b892efd66", 0x81}, {&(0x7f0000000380)="63ff5ed2efee09e5ca978b2254a1f890b13c2d9ef66b7117efa70151920cb2a3c005ea73bb821751fd7fe2b4e24081762f5e29a2538c8f33b86cf802c8644ede34b609b05419028c7c6a51bc7a4f2abd07", 0x51}, {&(0x7f0000000080)="c8d4b44b", 0x4}, {&(0x7f00000001c0)="ff75c0ff11", 0x5}, {&(0x7f0000000400)="6eb8992e3bb352bd2e3d459cbe9cab4f41e6d6eb7732c1b69dc26d3565ba407953a91fcd605c1d8545cdaa0cf25a437b8a4d9cf7773431441928de86fc6782815767a91b7a4dbed0cc1d52ca4bf418d529af14ef5cc47d0f195b3a35524a5caa51bb43425ee5d45ec5594fbff3a8ed91fbdbe30f0ad63467bd705dec39e9c350b27a49ca03ddf56a136b855da6dc178b6663b1ecebc0e64b26517614c3049ddffc908a9fe55fb6b81af8e2a99e73ad2103", 0xb1}, {&(0x7f00000004c0)="ee0a6940e0471e39b000d9af2cd9118e960fd00e1b8a373ee722e9f2c4308e933a60656be4cca604be6e992d424fa0157c8a5a7ca514e00e1371260ebafcef803d00d288e6b84c426677c703dcf4e03f9cae9455b123c63a566105b2c3bf6a8d07c90e19285dacfbedade6a0ea8c48c49d9f1be3d47968b7305bff860081cd48cf4f4f788c23e4dfa6fe83331cc38681c52787328be7a0a22fb2a99135d34a3d54b00f810af5dd926ff9309a3d103ea8246aed4be5626708383ddf8e74abb95144408556f4f2408ad1f094429f1c0ec5dd107d6439778a04798bf487b2794db950c989", 0xe3}, {&(0x7f00000005c0)="c338ce9d3d3b5cba7f69cd62b5ad2edd16e024062ec76790119be461045c49c2f71236d695a16fac7218f6197e7f12a5c9221d5852c2a0a845ee7b17e75258261bc77c1110a9692122623cd69b7c404aae2d7cf8e08b92d262e83005b957e325f6317112d0f8fea8", 0x68}, {&(0x7f0000000640)="d48bf4dc88b1dcf3a2a566fa4866f72f43b0e6e7bdd669fb5c4c796e45d6bb8a86abc2fc69df222a4cd688f3771c7c7c09981dac39c746ece664afdb1a8359c539a00cf2db4ea1e7a62288", 0x4b}, {&(0x7f00000006c0)="d13ee72c86a74be6b1b6c5641849ce0285f1a66d3dbf4f919b2e1a48718113fcb6dbe6218a0d5398ccc378b6333893791aad62c5ca239fff32e5146c1f8f3c1485f90f54978d17fe866cfc0d4cee5c94c8070e9a56679d330e2de77266ea70a9db2d4b71ce086813692a81b18083abd36f80b9c0cab598", 0x77}], 0x9, &(0x7f0000000800)=[{0x98, 0x118, 0x9, "3cf07091020ce1a8043de97348cc7182fbbedd84c1a4949d760d1a0d0e222322c1cdb75f723219d7dc1c1c714847e6bdd350c6cf95a51f34d4ae7a8cf4dfb5146c3cfac162ddcd51d13f0bd7fd070052cb711ffcbd8ce44e10a9fcd8111cf0f28f8fa26d9e91c47a19d8938c9807d6863e328c47dab812f51faccb9ac15a98c287"}], 0x98}, 0x0) 10:09:06 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:06 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:06 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 121.360465][T14004] EXT4-fs: 66 callbacks suppressed [ 121.360486][T14004] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:06 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:06 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:06 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 121.477232][T14025] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 121.487174][T14022] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 121.521094][T14033] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00', 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = gettid() ioprio_get$pid(0x3, r5) r6 = clone3(0xfffffffffffffffd, 0x0) r7 = syz_open_procfs(r6, &(0x7f00000000c0)='coredump_filter\x00') preadv(r7, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:09:07 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:07 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:07 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:07 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:07 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:07 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 122.159970][T14048] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 122.180713][T14049] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:07 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:07 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:07 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 122.205254][T14051] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:07 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:07 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 122.278609][T14067] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 122.290954][T14072] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 122.302753][T14077] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00', 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = gettid() ioprio_get$pid(0x3, r5) r6 = clone3(0xfffffffffffffffd, 0x0) r7 = syz_open_procfs(r6, &(0x7f00000000c0)='coredump_filter\x00') preadv(r7, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 10:09:08 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:08 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0xfeffffff) 10:09:08 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) 10:09:08 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 123.029282][ C0] scsi_io_completion_action: 18 callbacks suppressed [ 123.029307][ C0] sd 0:0:1:0: tag#5818 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 123.045860][ C0] sd 0:0:1:0: tag#5818 CDB: opcode=0xe5 (vendor) [ 123.052204][ C0] sd 0:0:1:0: tag#5818 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 123.061237][ C0] sd 0:0:1:0: tag#5818 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 123.070307][ C0] sd 0:0:1:0: tag#5818 CDB[20]: ba 10:09:08 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:08 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x12000000) [ 123.102064][ C0] sd 0:0:1:0: tag#5819 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 123.111906][ C0] sd 0:0:1:0: tag#5819 CDB: opcode=0xe5 (vendor) [ 123.118266][ C0] sd 0:0:1:0: tag#5819 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 123.127328][ C0] sd 0:0:1:0: tag#5819 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 123.136371][ C0] sd 0:0:1:0: tag#5819 CDB[20]: ba 10:09:08 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 123.173727][ C0] sd 0:0:1:0: tag#5820 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 123.183582][ C0] sd 0:0:1:0: tag#5820 CDB: opcode=0xe5 (vendor) [ 123.189970][ C0] sd 0:0:1:0: tag#5820 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 123.191252][ C1] sd 0:0:1:0: tag#5821 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 123.199013][ C0] sd 0:0:1:0: tag#5820 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 123.208819][ C1] sd 0:0:1:0: tag#5821 CDB: opcode=0xe5 (vendor) [ 123.217810][ C0] sd 0:0:1:0: tag#5820 CDB[20]: ba [ 123.224121][ C1] sd 0:0:1:0: tag#5821 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 123.238233][ C1] sd 0:0:1:0: tag#5821 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 123.247287][ C1] sd 0:0:1:0: tag#5821 CDB[20]: ba 10:09:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00', 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = gettid() ioprio_get$pid(0x3, r5) r6 = clone3(0xfffffffffffffffd, 0x0) syz_open_procfs(r6, &(0x7f00000000c0)='coredump_filter\x00') 10:09:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:08 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:08 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:08 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x12000000) 10:09:09 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 123.951286][ C0] sd 0:0:1:0: tag#5762 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 123.961157][ C0] sd 0:0:1:0: tag#5762 CDB: opcode=0xe5 (vendor) [ 123.967518][ C0] sd 0:0:1:0: tag#5762 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 123.976553][ C0] sd 0:0:1:0: tag#5762 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 123.985788][ C0] sd 0:0:1:0: tag#5762 CDB[20]: ba 10:09:09 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:09 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:09 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{}, {0x77359400}}) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x211, 0x401) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d80)={0xfffffffffffffe00, [], 0x0, "094ed3cba93486"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000b40)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) mount(&(0x7f0000000100)=@sg0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='cgroup\x00', 0x2100, 0x0) [ 123.998209][ C1] sd 0:0:1:0: tag#5763 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 124.008106][ C1] sd 0:0:1:0: tag#5763 CDB: opcode=0xe5 (vendor) [ 124.014484][ C1] sd 0:0:1:0: tag#5763 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 124.023542][ C1] sd 0:0:1:0: tag#5763 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 124.032612][ C1] sd 0:0:1:0: tag#5763 CDB[20]: ba 10:09:09 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:09 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 1) [ 124.124694][ C1] sd 0:0:1:0: tag#5768 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 124.126879][T14176] FAULT_INJECTION: forcing a failure. [ 124.126879][T14176] name failslab, interval 1, probability 0, space 0, times 0 [ 124.134562][ C1] sd 0:0:1:0: tag#5768 CDB: opcode=0xe5 (vendor) [ 124.148200][T14176] CPU: 0 PID: 14176 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 124.154550][ C1] sd 0:0:1:0: tag#5768 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 124.163261][T14176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.172379][ C1] sd 0:0:1:0: tag#5768 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 124.182375][T14176] Call Trace: [ 124.182383][T14176] dump_stack_lvl+0xd6/0x122 [ 124.191397][ C1] sd 0:0:1:0: tag#5768 CDB[20]: ba [ 124.194650][T14176] dump_stack+0x11/0x1b [ 124.194672][T14176] should_fail+0x23c/0x250 [ 124.212852][T14176] ? getname_flags+0x84/0x3f0 [ 124.217583][T14176] __should_failslab+0x81/0x90 [ 124.222356][T14176] should_failslab+0x5/0x20 [ 124.226914][T14176] kmem_cache_alloc+0x4f/0x300 [ 124.231767][T14176] ? __cond_resched+0x11/0x40 [ 124.236449][T14176] getname_flags+0x84/0x3f0 [ 124.241077][T14176] __x64_sys_mkdir+0x31/0x50 [ 124.245664][T14176] do_syscall_64+0x44/0xa0 [ 124.250068][T14176] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.255983][T14176] RIP: 0033:0x7ff78c46b9e7 [ 124.260422][T14176] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.280092][T14176] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 124.288488][T14176] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46b9e7 [ 124.296440][T14176] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 124.304560][T14176] RBP: 00007ff78a1e4040 R08: 0000000000000000 R09: 0000000000302424 [ 124.312540][T14176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140 [ 124.320494][T14176] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 10:09:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00', 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = gettid() ioprio_get$pid(0x3, r5) clone3(0xfffffffffffffffd, 0x0) 10:09:09 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 1) 10:09:09 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:09 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:09 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 1) 10:09:09 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 2) [ 124.797844][T14194] FAULT_INJECTION: forcing a failure. [ 124.797844][T14194] name failslab, interval 1, probability 0, space 0, times 0 [ 124.799262][T14193] FAULT_INJECTION: forcing a failure. [ 124.799262][T14193] name failslab, interval 1, probability 0, space 0, times 0 [ 124.810553][T14194] CPU: 1 PID: 14194 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 124.832055][T14194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.842170][T14194] Call Trace: [ 124.845496][T14194] dump_stack_lvl+0xd6/0x122 [ 124.850080][T14194] dump_stack+0x11/0x1b [ 124.854220][T14194] should_fail+0x23c/0x250 [ 124.858680][T14194] ? getname_flags+0x84/0x3f0 [ 124.863344][T14194] __should_failslab+0x81/0x90 [ 124.868093][T14194] should_failslab+0x5/0x20 [ 124.872620][T14194] kmem_cache_alloc+0x4f/0x300 [ 124.877368][T14194] ? __cond_resched+0x11/0x40 [ 124.882090][T14194] getname_flags+0x84/0x3f0 [ 124.886582][T14194] __x64_sys_mkdir+0x31/0x50 [ 124.891198][T14194] do_syscall_64+0x44/0xa0 [ 124.895600][T14194] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.901495][T14194] RIP: 0033:0x7fba0cc879e7 [ 124.905930][T14194] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.925563][T14194] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 124.933968][T14194] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc879e7 10:09:10 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 124.941926][T14194] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 124.949882][T14194] RBP: 00007fba0aa00040 R08: 0000000000000000 R09: 0000000000302424 [ 124.957842][T14194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140 [ 124.965805][T14194] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 124.973837][T14193] CPU: 0 PID: 14193 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 124.982597][T14193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.992645][T14193] Call Trace: 10:09:10 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 2) [ 124.995922][T14193] dump_stack_lvl+0xd6/0x122 [ 125.000525][T14193] dump_stack+0x11/0x1b [ 125.004684][T14193] should_fail+0x23c/0x250 [ 125.009102][T14193] ? getname_flags+0x84/0x3f0 [ 125.013854][T14193] __should_failslab+0x81/0x90 [ 125.017390][T14198] FAULT_INJECTION: forcing a failure. [ 125.017390][T14198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 125.018617][T14193] should_failslab+0x5/0x20 [ 125.036103][T14193] kmem_cache_alloc+0x4f/0x300 [ 125.040924][T14193] ? __cond_resched+0x11/0x40 [ 125.045602][T14193] getname_flags+0x84/0x3f0 [ 125.050108][T14193] __x64_sys_mkdir+0x31/0x50 [ 125.054694][T14193] do_syscall_64+0x44/0xa0 [ 125.059132][T14193] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.065067][T14193] RIP: 0033:0x7f579e8dd9e7 [ 125.069468][T14193] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.089056][T14193] RSP: 002b:00007f579c655fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 125.097448][T14193] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dd9e7 [ 125.105451][T14193] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 125.113430][T14193] RBP: 00007f579c656040 R08: 0000000000000000 R09: 0000000000302424 [ 125.121386][T14193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140 [ 125.129343][T14193] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 125.137299][T14198] CPU: 1 PID: 14198 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 125.146186][T14198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.156244][T14198] Call Trace: [ 125.159523][T14198] dump_stack_lvl+0xd6/0x122 [ 125.164138][T14198] dump_stack+0x11/0x1b [ 125.168296][T14198] should_fail+0x23c/0x250 [ 125.172710][T14198] should_fail_usercopy+0x16/0x20 [ 125.177747][T14198] strncpy_from_user+0x21/0x250 [ 125.182606][T14198] getname_flags+0xb8/0x3f0 [ 125.187185][T14198] __x64_sys_mkdir+0x31/0x50 [ 125.191789][T14198] do_syscall_64+0x44/0xa0 10:09:10 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:10 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:10 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 125.196310][T14198] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.202257][T14198] RIP: 0033:0x7ff78c46b9e7 [ 125.206671][T14198] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.226280][T14198] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 125.234694][T14198] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46b9e7 10:09:10 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 125.242700][T14198] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 125.250673][T14198] RBP: 00007ff78a1e4040 R08: 0000000000000000 R09: 0000000000302424 [ 125.258642][T14198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140 [ 125.266691][T14198] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 125.284702][T14221] FAULT_INJECTION: forcing a failure. [ 125.284702][T14221] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 125.298808][T14221] CPU: 1 PID: 14221 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 125.307567][T14221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.317655][T14221] Call Trace: [ 125.320929][T14221] dump_stack_lvl+0xd6/0x122 [ 125.325538][T14221] dump_stack+0x11/0x1b [ 125.329701][T14221] should_fail+0x23c/0x250 [ 125.334123][T14221] should_fail_usercopy+0x16/0x20 [ 125.339203][T14221] strncpy_from_user+0x21/0x250 [ 125.344061][T14221] getname_flags+0xb8/0x3f0 [ 125.348584][T14221] __x64_sys_mkdir+0x31/0x50 [ 125.353198][T14221] do_syscall_64+0x44/0xa0 [ 125.357707][T14221] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.363691][T14221] RIP: 0033:0x7fba0cc879e7 [ 125.368102][T14221] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.387742][T14221] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 125.396137][T14221] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc879e7 [ 125.404142][T14221] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 125.412093][T14221] RBP: 00007fba0aa00040 R08: 0000000000000000 R09: 0000000000302424 [ 125.420046][T14221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140 [ 125.428168][T14221] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 10:09:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00', 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r5 = gettid() ioprio_get$pid(0x3, r5) 10:09:10 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:10 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 2) 10:09:10 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:10 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 3) 10:09:10 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 3) 10:09:10 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 125.839131][T14242] FAULT_INJECTION: forcing a failure. [ 125.839131][T14242] name failslab, interval 1, probability 0, space 0, times 0 [ 125.851782][T14242] CPU: 1 PID: 14242 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 125.860551][T14242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.870610][T14242] Call Trace: [ 125.872411][T14243] FAULT_INJECTION: forcing a failure. [ 125.872411][T14243] name failslab, interval 1, probability 0, space 0, times 0 [ 125.873921][T14242] dump_stack_lvl+0xd6/0x122 [ 125.891101][T14242] dump_stack+0x11/0x1b [ 125.895261][T14242] should_fail+0x23c/0x250 [ 125.899680][T14242] ? __se_sys_mount+0x4e/0x2f0 [ 125.904451][T14242] __should_failslab+0x81/0x90 [ 125.909208][T14242] should_failslab+0x5/0x20 [ 125.913711][T14242] __kmalloc_track_caller+0x6d/0x350 [ 125.919492][T14242] ? do_mkdirat+0x293/0x2c0 [ 125.924188][T14242] ? strnlen_user+0x137/0x1c0 [ 125.928867][T14242] strndup_user+0x73/0x120 [ 125.934042][T14242] __se_sys_mount+0x4e/0x2f0 [ 125.938772][T14242] ? do_mkdirat+0x293/0x2c0 [ 125.943286][T14242] __x64_sys_mount+0x63/0x70 [ 125.947867][T14242] do_syscall_64+0x44/0xa0 [ 125.952280][T14242] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.958185][T14242] RIP: 0033:0x7ff78c46ddfa [ 125.962592][T14242] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.982551][T14242] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 125.990962][T14242] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 125.999051][T14242] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 126.007127][T14242] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 126.015089][T14242] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 126.023046][T14242] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 126.031005][T14243] CPU: 0 PID: 14243 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 126.039881][T14243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.049937][T14243] Call Trace: [ 126.053219][T14243] dump_stack_lvl+0xd6/0x122 [ 126.057816][T14243] dump_stack+0x11/0x1b [ 126.060819][T14244] FAULT_INJECTION: forcing a failure. [ 126.060819][T14244] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.061972][T14243] should_fail+0x23c/0x250 [ 126.061993][T14243] ? __se_sys_mount+0x4e/0x2f0 [ 126.084127][T14243] __should_failslab+0x81/0x90 [ 126.088888][T14243] should_failslab+0x5/0x20 [ 126.093559][T14243] __kmalloc_track_caller+0x6d/0x350 [ 126.098831][T14243] ? do_mkdirat+0x293/0x2c0 [ 126.103408][T14243] ? strnlen_user+0x137/0x1c0 [ 126.108091][T14243] strndup_user+0x73/0x120 [ 126.112495][T14243] __se_sys_mount+0x4e/0x2f0 [ 126.117075][T14243] ? do_mkdirat+0x293/0x2c0 [ 126.121565][T14243] __x64_sys_mount+0x63/0x70 [ 126.126138][T14243] do_syscall_64+0x44/0xa0 [ 126.130545][T14243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.136437][T14243] RIP: 0033:0x7fba0cc89dfa [ 126.140843][T14243] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.160451][T14243] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 126.168855][T14243] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 126.176813][T14243] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 10:09:11 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 4) 10:09:11 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 4) [ 126.184766][T14243] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 126.192734][T14243] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 126.200697][T14243] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 126.208664][T14244] CPU: 1 PID: 14244 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 126.217448][T14244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.229663][T14244] Call Trace: [ 126.232940][T14244] dump_stack_lvl+0xd6/0x122 10:09:11 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:11 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 126.237578][T14244] dump_stack+0x11/0x1b [ 126.241784][T14244] should_fail+0x23c/0x250 [ 126.246218][T14244] should_fail_usercopy+0x16/0x20 [ 126.251294][T14244] strncpy_from_user+0x21/0x250 [ 126.256178][T14244] getname_flags+0xb8/0x3f0 [ 126.260780][T14244] __x64_sys_mkdir+0x31/0x50 [ 126.265377][T14244] do_syscall_64+0x44/0xa0 [ 126.269829][T14244] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.275808][T14244] RIP: 0033:0x7f579e8dd9e7 10:09:11 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 126.280225][T14244] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.299832][T14244] RSP: 002b:00007f579c655fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 126.308239][T14244] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dd9e7 [ 126.316213][T14244] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 126.324187][T14244] RBP: 00007f579c656040 R08: 0000000000000000 R09: 0000000000302424 [ 126.332180][T14244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140 [ 126.340155][T14244] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 126.380779][T14244] EXT4-fs: 10 callbacks suppressed [ 126.380793][T14244] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 126.385315][T14279] FAULT_INJECTION: forcing a failure. [ 126.385315][T14279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.407403][T14279] CPU: 1 PID: 14279 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 126.414115][T14278] FAULT_INJECTION: forcing a failure. [ 126.414115][T14278] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.416168][T14279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.416180][T14279] Call Trace: [ 126.416187][T14279] dump_stack_lvl+0xd6/0x122 [ 126.447076][T14279] dump_stack+0x11/0x1b [ 126.451223][T14279] should_fail+0x23c/0x250 [ 126.455626][T14279] should_fail_usercopy+0x16/0x20 [ 126.460633][T14279] _copy_from_user+0x1c/0xd0 [ 126.465211][T14279] strndup_user+0xb0/0x120 [ 126.469616][T14279] __se_sys_mount+0x4e/0x2f0 [ 126.474195][T14279] ? do_mkdirat+0x293/0x2c0 [ 126.478687][T14279] __x64_sys_mount+0x63/0x70 [ 126.483265][T14279] do_syscall_64+0x44/0xa0 [ 126.487670][T14279] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.493552][T14279] RIP: 0033:0x7fba0cc89dfa [ 126.497953][T14279] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.517542][T14279] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 126.525940][T14279] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 126.533898][T14279] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 126.541855][T14279] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 126.549811][T14279] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 126.557765][T14279] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 126.565732][T14278] CPU: 0 PID: 14278 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 126.574496][T14278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.584554][T14278] Call Trace: [ 126.587832][T14278] dump_stack_lvl+0xd6/0x122 [ 126.592408][T14278] dump_stack+0x11/0x1b [ 126.596545][T14278] should_fail+0x23c/0x250 [ 126.600941][T14278] should_fail_usercopy+0x16/0x20 [ 126.605946][T14278] _copy_from_user+0x1c/0xd0 [ 126.610530][T14278] strndup_user+0xb0/0x120 [ 126.614927][T14278] __se_sys_mount+0x4e/0x2f0 [ 126.619498][T14278] ? do_mkdirat+0x293/0x2c0 [ 126.623981][T14278] __x64_sys_mount+0x63/0x70 [ 126.628557][T14278] do_syscall_64+0x44/0xa0 [ 126.632986][T14278] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.638865][T14278] RIP: 0033:0x7ff78c46ddfa [ 126.643258][T14278] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.662843][T14278] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 126.671230][T14278] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 126.679184][T14278] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 10:09:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00', 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) gettid() 10:09:11 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:11 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:11 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 3) 10:09:11 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 5) 10:09:11 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 5) [ 126.687143][T14278] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 126.695095][T14278] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 126.703062][T14278] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 126.751788][T14294] FAULT_INJECTION: forcing a failure. [ 126.751788][T14294] name failslab, interval 1, probability 0, space 0, times 0 [ 126.753995][T14291] FAULT_INJECTION: forcing a failure. [ 126.753995][T14291] name failslab, interval 1, probability 0, space 0, times 0 [ 126.764516][T14294] CPU: 0 PID: 14294 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 126.785799][T14294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.795929][T14294] Call Trace: [ 126.799193][T14294] dump_stack_lvl+0xd6/0x122 [ 126.803773][T14294] dump_stack+0x11/0x1b [ 126.807935][T14294] should_fail+0x23c/0x250 [ 126.812337][T14294] __should_failslab+0x81/0x90 [ 126.817085][T14294] ? __se_sys_mount+0xf7/0x2f0 [ 126.821839][T14294] should_failslab+0x5/0x20 [ 126.826341][T14294] kmem_cache_alloc_trace+0x52/0x320 [ 126.831610][T14294] ? _copy_from_user+0x94/0xd0 [ 126.836357][T14294] __se_sys_mount+0xf7/0x2f0 [ 126.840935][T14294] __x64_sys_mount+0x63/0x70 [ 126.845510][T14294] do_syscall_64+0x44/0xa0 [ 126.849916][T14294] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.855805][T14294] RIP: 0033:0x7ff78c46ddfa [ 126.860202][T14294] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.879789][T14294] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 126.888182][T14294] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 126.896157][T14294] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 126.904151][T14294] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 126.912110][T14294] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 126.920067][T14294] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 126.928026][T14291] CPU: 1 PID: 14291 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 126.936791][T14291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.946841][T14291] Call Trace: [ 126.950120][T14291] dump_stack_lvl+0xd6/0x122 [ 126.954720][T14291] dump_stack+0x11/0x1b [ 126.958875][T14291] should_fail+0x23c/0x250 [ 126.963291][T14291] __should_failslab+0x81/0x90 [ 126.968065][T14291] ? __se_sys_mount+0xf7/0x2f0 [ 126.972845][T14291] should_failslab+0x5/0x20 [ 126.977358][T14291] kmem_cache_alloc_trace+0x52/0x320 [ 126.982649][T14291] ? _copy_from_user+0x94/0xd0 [ 126.987418][T14291] __se_sys_mount+0xf7/0x2f0 [ 126.992014][T14291] __x64_sys_mount+0x63/0x70 [ 126.992635][T14295] FAULT_INJECTION: forcing a failure. [ 126.992635][T14295] name failslab, interval 1, probability 0, space 0, times 0 [ 126.996607][T14291] do_syscall_64+0x44/0xa0 [ 126.996633][T14291] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.019454][T14291] RIP: 0033:0x7fba0cc89dfa [ 127.023854][T14291] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.043446][T14291] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 127.051842][T14291] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 127.059797][T14291] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 127.067750][T14291] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 127.075704][T14291] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 127.083657][T14291] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 127.091613][T14295] CPU: 0 PID: 14295 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 10:09:12 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:12 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 6) 10:09:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:12 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 6) [ 127.100373][T14295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.110423][T14295] Call Trace: [ 127.113698][T14295] dump_stack_lvl+0xd6/0x122 [ 127.118293][T14295] dump_stack+0x11/0x1b [ 127.122453][T14295] should_fail+0x23c/0x250 [ 127.126867][T14295] ? __se_sys_mount+0x4e/0x2f0 [ 127.131633][T14295] __should_failslab+0x81/0x90 [ 127.136397][T14295] should_failslab+0x5/0x20 [ 127.140903][T14295] __kmalloc_track_caller+0x6d/0x350 [ 127.146188][T14295] ? do_mkdirat+0x293/0x2c0 10:09:12 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 127.150691][T14295] ? strnlen_user+0x137/0x1c0 [ 127.155383][T14295] strndup_user+0x73/0x120 [ 127.159859][T14295] __se_sys_mount+0x4e/0x2f0 [ 127.164452][T14295] ? do_mkdirat+0x293/0x2c0 [ 127.168961][T14295] __x64_sys_mount+0x63/0x70 [ 127.173560][T14295] do_syscall_64+0x44/0xa0 [ 127.177988][T14295] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.183920][T14295] RIP: 0033:0x7f579e8dfdfa [ 127.188330][T14295] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.207935][T14295] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 127.216350][T14295] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa [ 127.224324][T14295] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 127.232296][T14295] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 127.240270][T14295] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 127.248249][T14295] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 127.269977][T14327] FAULT_INJECTION: forcing a failure. [ 127.269977][T14327] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.283052][T14327] CPU: 0 PID: 14327 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 127.285539][T14330] FAULT_INJECTION: forcing a failure. [ 127.285539][T14330] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.291809][T14327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.291826][T14327] Call Trace: [ 127.291834][T14327] dump_stack_lvl+0xd6/0x122 [ 127.322704][T14327] dump_stack+0x11/0x1b [ 127.326848][T14327] should_fail+0x23c/0x250 [ 127.331247][T14327] should_fail_usercopy+0x16/0x20 [ 127.336256][T14327] _copy_from_user+0x1c/0xd0 [ 127.340847][T14327] __se_sys_mount+0x119/0x2f0 [ 127.345509][T14327] __x64_sys_mount+0x63/0x70 [ 127.350095][T14327] do_syscall_64+0x44/0xa0 [ 127.354510][T14327] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.360410][T14327] RIP: 0033:0x7fba0cc89dfa [ 127.364811][T14327] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.384403][T14327] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 127.392803][T14327] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 127.400772][T14327] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 127.408742][T14327] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 127.416697][T14327] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 127.424648][T14327] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 127.432613][T14330] CPU: 1 PID: 14330 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 127.441375][T14330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.451428][T14330] Call Trace: [ 127.454690][T14330] dump_stack_lvl+0xd6/0x122 [ 127.459264][T14330] dump_stack+0x11/0x1b [ 127.463413][T14330] should_fail+0x23c/0x250 [ 127.467807][T14330] should_fail_usercopy+0x16/0x20 [ 127.472811][T14330] _copy_from_user+0x1c/0xd0 [ 127.477378][T14330] __se_sys_mount+0x119/0x2f0 [ 127.482039][T14330] __x64_sys_mount+0x63/0x70 [ 127.486608][T14330] do_syscall_64+0x44/0xa0 [ 127.491010][T14330] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.496890][T14330] RIP: 0033:0x7ff78c46ddfa [ 127.501284][T14330] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.520875][T14330] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 127.529267][T14330] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 127.537222][T14330] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 127.545186][T14330] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 10:09:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00', 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) 10:09:12 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2={0x0}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:12 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 4) [ 127.553146][T14330] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 127.561195][T14330] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 127.581320][T14327] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 127.591657][T14330] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:12 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 7) 10:09:12 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 7) 10:09:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2={0xff, 0x2, '\x00', 0x0}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 127.605852][T14338] FAULT_INJECTION: forcing a failure. [ 127.605852][T14338] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.618918][T14338] CPU: 0 PID: 14338 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 127.627682][T14338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.637738][T14338] Call Trace: [ 127.641013][T14338] dump_stack_lvl+0xd6/0x122 [ 127.645617][T14338] dump_stack+0x11/0x1b [ 127.649774][T14338] should_fail+0x23c/0x250 10:09:12 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 127.654197][T14338] should_fail_usercopy+0x16/0x20 [ 127.659223][T14338] _copy_from_user+0x1c/0xd0 [ 127.663826][T14338] strndup_user+0xb0/0x120 [ 127.668239][T14338] __se_sys_mount+0x4e/0x2f0 [ 127.672842][T14338] ? do_mkdirat+0x293/0x2c0 [ 127.677349][T14338] __x64_sys_mount+0x63/0x70 [ 127.681939][T14338] do_syscall_64+0x44/0xa0 [ 127.686355][T14338] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.692255][T14338] RIP: 0033:0x7f579e8dfdfa 10:09:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2={0xff, 0x2, '\x00', 0x8}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:12 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 127.696665][T14338] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.716279][T14338] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 127.724690][T14338] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa [ 127.732659][T14338] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 127.740634][T14338] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 127.748608][T14338] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 10:09:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2={0xff, 0x2, '\x00', 0x5c}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:12 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 127.756578][T14338] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 127.812253][T14372] FAULT_INJECTION: forcing a failure. [ 127.812253][T14372] name failslab, interval 1, probability 0, space 0, times 0 [ 127.815751][T14374] FAULT_INJECTION: forcing a failure. [ 127.815751][T14374] name failslab, interval 1, probability 0, space 0, times 0 [ 127.824920][T14372] CPU: 1 PID: 14372 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 127.846209][T14372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.856251][T14372] Call Trace: [ 127.859517][T14372] dump_stack_lvl+0xd6/0x122 [ 127.864099][T14372] dump_stack+0x11/0x1b [ 127.868240][T14372] should_fail+0x23c/0x250 [ 127.872647][T14372] ? getname_flags+0x84/0x3f0 [ 127.877312][T14372] __should_failslab+0x81/0x90 [ 127.882061][T14372] should_failslab+0x5/0x20 [ 127.886551][T14372] kmem_cache_alloc+0x4f/0x300 [ 127.891298][T14372] ? should_fail+0xd6/0x250 [ 127.895791][T14372] getname_flags+0x84/0x3f0 [ 127.900284][T14372] ? should_fail+0xd6/0x250 [ 127.904767][T14372] user_path_at_empty+0x28/0x110 [ 127.909696][T14372] __se_sys_mount+0x217/0x2f0 [ 127.914360][T14372] __x64_sys_mount+0x63/0x70 [ 127.918935][T14372] do_syscall_64+0x44/0xa0 [ 127.923342][T14372] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.929227][T14372] RIP: 0033:0x7fba0cc89dfa [ 127.933627][T14372] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.953216][T14372] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 127.961612][T14372] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 127.969566][T14372] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 127.977521][T14372] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 127.985482][T14372] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 127.993448][T14372] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 128.001409][T14374] CPU: 0 PID: 14374 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 128.010173][T14374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.020223][T14374] Call Trace: [ 128.023502][T14374] dump_stack_lvl+0xd6/0x122 [ 128.028094][T14374] dump_stack+0x11/0x1b [ 128.032249][T14374] should_fail+0x23c/0x250 [ 128.036662][T14374] ? getname_flags+0x84/0x3f0 [ 128.041346][T14374] __should_failslab+0x81/0x90 [ 128.046114][T14374] should_failslab+0x5/0x20 [ 128.050626][T14374] kmem_cache_alloc+0x4f/0x300 [ 128.055391][T14374] ? should_fail+0xd6/0x250 [ 128.059886][T14374] getname_flags+0x84/0x3f0 [ 128.064397][T14374] ? should_fail+0xd6/0x250 [ 128.068906][T14374] user_path_at_empty+0x28/0x110 [ 128.073848][T14374] __se_sys_mount+0x217/0x2f0 [ 128.078523][T14374] __x64_sys_mount+0x63/0x70 [ 128.083134][T14374] do_syscall_64+0x44/0xa0 [ 128.087531][T14374] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.093411][T14374] RIP: 0033:0x7ff78c46ddfa [ 128.097813][T14374] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.117425][T14374] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 128.125821][T14374] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 128.133778][T14374] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 128.141734][T14374] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 128.149684][T14374] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 128.157651][T14374] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 10:09:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00', 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:13 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2={0xff, 0x2, '\x00', 0x6d}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:13 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 5) 10:09:13 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 8) 10:09:13 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:13 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 8) [ 128.470938][T14393] FAULT_INJECTION: forcing a failure. [ 128.470938][T14393] name failslab, interval 1, probability 0, space 0, times 0 [ 128.482069][T14396] FAULT_INJECTION: forcing a failure. [ 128.482069][T14396] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.483580][T14393] CPU: 1 PID: 14393 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 128.505319][T14393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.515368][T14393] Call Trace: [ 128.518634][T14393] dump_stack_lvl+0xd6/0x122 [ 128.523214][T14393] dump_stack+0x11/0x1b [ 128.527351][T14393] should_fail+0x23c/0x250 [ 128.531752][T14393] __should_failslab+0x81/0x90 [ 128.536502][T14393] ? __se_sys_mount+0xf7/0x2f0 [ 128.541254][T14393] should_failslab+0x5/0x20 [ 128.545749][T14393] kmem_cache_alloc_trace+0x52/0x320 [ 128.551017][T14393] ? _copy_from_user+0x94/0xd0 [ 128.555766][T14393] __se_sys_mount+0xf7/0x2f0 [ 128.560344][T14393] __x64_sys_mount+0x63/0x70 [ 128.564929][T14393] do_syscall_64+0x44/0xa0 [ 128.569337][T14393] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.575223][T14393] RIP: 0033:0x7f579e8dfdfa [ 128.579619][T14393] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.599211][T14393] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 128.607609][T14393] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa 10:09:13 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 6) [ 128.615564][T14393] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 128.623515][T14393] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 128.631468][T14393] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 128.639420][T14393] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 128.647377][T14396] CPU: 0 PID: 14396 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 128.656137][T14396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.666193][T14396] Call Trace: [ 128.666295][T14395] FAULT_INJECTION: forcing a failure. [ 128.666295][T14395] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.669471][T14396] dump_stack_lvl+0xd6/0x122 [ 128.669494][T14396] dump_stack+0x11/0x1b [ 128.691192][T14396] should_fail+0x23c/0x250 [ 128.695603][T14396] should_fail_usercopy+0x16/0x20 [ 128.700618][T14396] strncpy_from_user+0x21/0x250 [ 128.705590][T14396] getname_flags+0xb8/0x3f0 [ 128.710089][T14396] ? should_fail+0xd6/0x250 [ 128.714584][T14396] user_path_at_empty+0x28/0x110 [ 128.719524][T14396] __se_sys_mount+0x217/0x2f0 [ 128.724203][T14396] __x64_sys_mount+0x63/0x70 [ 128.728789][T14396] do_syscall_64+0x44/0xa0 [ 128.733193][T14396] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.739512][T14396] RIP: 0033:0x7ff78c46ddfa [ 128.743911][T14396] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.763595][T14396] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 128.772011][T14396] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 128.779968][T14396] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 128.787921][T14396] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 128.795893][T14396] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 128.803853][T14396] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 128.811809][T14395] CPU: 1 PID: 14395 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 128.820573][T14395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.830626][T14395] Call Trace: [ 128.833901][T14395] dump_stack_lvl+0xd6/0x122 [ 128.838502][T14395] dump_stack+0x11/0x1b [ 128.842666][T14395] should_fail+0x23c/0x250 [ 128.847088][T14395] should_fail_usercopy+0x16/0x20 [ 128.852109][T14395] strncpy_from_user+0x21/0x250 [ 128.856967][T14395] getname_flags+0xb8/0x3f0 [ 128.861474][T14395] ? should_fail+0xd6/0x250 [ 128.865980][T14395] user_path_at_empty+0x28/0x110 10:09:13 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:13 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 9) 10:09:13 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2={0x0}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:13 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2={0xff, 0x2, '\x00', 0x0}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 128.870928][T14395] __se_sys_mount+0x217/0x2f0 [ 128.875612][T14395] __x64_sys_mount+0x63/0x70 [ 128.880207][T14395] do_syscall_64+0x44/0xa0 [ 128.884636][T14395] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.890539][T14395] RIP: 0033:0x7fba0cc89dfa [ 128.894958][T14395] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.914568][T14395] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 10:09:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x2, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 128.922982][T14395] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 128.930965][T14395] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 128.938939][T14395] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 128.946913][T14395] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 128.954884][T14395] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 128.996347][T14426] FAULT_INJECTION: forcing a failure. [ 128.996347][T14426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 129.009660][T14426] CPU: 1 PID: 14426 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 129.018426][T14426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.028477][T14426] Call Trace: [ 129.031884][T14426] dump_stack_lvl+0xd6/0x122 [ 129.036483][T14426] dump_stack+0x11/0x1b [ 129.040641][T14426] should_fail+0x23c/0x250 [ 129.045066][T14426] should_fail_usercopy+0x16/0x20 [ 129.046561][T14428] FAULT_INJECTION: forcing a failure. [ 129.046561][T14428] name failslab, interval 1, probability 0, space 0, times 0 [ 129.050095][T14426] _copy_from_user+0x1c/0xd0 [ 129.050122][T14426] __se_sys_mount+0x119/0x2f0 [ 129.072091][T14426] __x64_sys_mount+0x63/0x70 [ 129.076678][T14426] do_syscall_64+0x44/0xa0 [ 129.081185][T14426] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.087088][T14426] RIP: 0033:0x7f579e8dfdfa [ 129.091501][T14426] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.111185][T14426] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 129.119593][T14426] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa [ 129.127643][T14426] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 129.135600][T14426] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 129.143555][T14426] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 129.151714][T14426] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 129.159681][T14428] CPU: 0 PID: 14428 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 129.166115][T14426] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 129.168504][T14428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.168516][T14428] Call Trace: [ 129.168523][T14428] dump_stack_lvl+0xd6/0x122 [ 129.194939][T14428] dump_stack+0x11/0x1b [ 129.199081][T14428] should_fail+0x23c/0x250 [ 129.203475][T14428] __should_failslab+0x81/0x90 [ 129.208234][T14428] ? alloc_fs_context+0x46/0x500 [ 129.213150][T14428] should_failslab+0x5/0x20 [ 129.217631][T14428] kmem_cache_alloc_trace+0x52/0x320 [ 129.222896][T14428] alloc_fs_context+0x46/0x500 [ 129.227736][T14428] ? security_capable+0x91/0xa0 [ 129.232574][T14428] fs_context_for_reconfigure+0x42/0x50 [ 129.238190][T14428] path_mount+0x122a/0x1d20 [ 129.242675][T14428] __se_sys_mount+0x24b/0x2f0 [ 129.247336][T14428] __x64_sys_mount+0x63/0x70 [ 129.251904][T14428] do_syscall_64+0x44/0xa0 [ 129.256359][T14428] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.262235][T14428] RIP: 0033:0x7ff78c46ddfa [ 129.266638][T14428] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.286227][T14428] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 10:09:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:14 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2={0xff, 0x2, '\x00', 0x8}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x3, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:14 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 9) 10:09:14 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 7) [ 129.294623][T14428] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 129.302589][T14428] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 129.310555][T14428] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 129.318512][T14428] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 129.326485][T14428] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 129.358996][T14442] FAULT_INJECTION: forcing a failure. [ 129.358996][T14442] name failslab, interval 1, probability 0, space 0, times 0 [ 129.366597][T14446] FAULT_INJECTION: forcing a failure. [ 129.366597][T14446] name failslab, interval 1, probability 0, space 0, times 0 [ 129.371668][T14442] CPU: 1 PID: 14442 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 129.393142][T14442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.403196][T14442] Call Trace: [ 129.406462][T14442] dump_stack_lvl+0xd6/0x122 [ 129.411056][T14442] dump_stack+0x11/0x1b [ 129.415197][T14442] should_fail+0x23c/0x250 [ 129.419604][T14442] ? getname_flags+0x84/0x3f0 [ 129.424271][T14442] __should_failslab+0x81/0x90 [ 129.429022][T14442] should_failslab+0x5/0x20 [ 129.433513][T14442] kmem_cache_alloc+0x4f/0x300 [ 129.438261][T14442] ? should_fail+0xd6/0x250 [ 129.442762][T14442] getname_flags+0x84/0x3f0 [ 129.447252][T14442] ? should_fail+0xd6/0x250 [ 129.451739][T14442] user_path_at_empty+0x28/0x110 [ 129.456666][T14442] __se_sys_mount+0x217/0x2f0 [ 129.461332][T14442] __x64_sys_mount+0x63/0x70 [ 129.465999][T14442] do_syscall_64+0x44/0xa0 [ 129.470411][T14442] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.476323][T14442] RIP: 0033:0x7f579e8dfdfa [ 129.480727][T14442] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.500318][T14442] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 129.508715][T14442] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa [ 129.516671][T14442] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 129.524627][T14442] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 129.532582][T14442] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 129.540540][T14442] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 129.548500][T14446] CPU: 0 PID: 14446 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 129.557428][T14446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.567478][T14446] Call Trace: [ 129.570758][T14446] dump_stack_lvl+0xd6/0x122 [ 129.575362][T14446] dump_stack+0x11/0x1b [ 129.579581][T14446] should_fail+0x23c/0x250 [ 129.584024][T14446] __should_failslab+0x81/0x90 [ 129.588947][T14446] ? alloc_fs_context+0x46/0x500 [ 129.593920][T14446] should_failslab+0x5/0x20 [ 129.598409][T14446] kmem_cache_alloc_trace+0x52/0x320 [ 129.603744][T14446] alloc_fs_context+0x46/0x500 10:09:14 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2={0xff, 0x2, '\x00', 0x5c}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:14 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 8) 10:09:14 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 10) 10:09:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x4, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 129.608524][T14446] ? security_capable+0x91/0xa0 [ 129.613380][T14446] fs_context_for_reconfigure+0x42/0x50 [ 129.618946][T14446] path_mount+0x122a/0x1d20 [ 129.623550][T14446] __se_sys_mount+0x24b/0x2f0 [ 129.628313][T14446] __x64_sys_mount+0x63/0x70 [ 129.632906][T14446] do_syscall_64+0x44/0xa0 [ 129.637483][T14446] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.643399][T14446] RIP: 0033:0x7fba0cc89dfa 10:09:14 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2={0xff, 0x2, '\x00', 0x6d}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x5, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 129.647852][T14446] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.667562][T14446] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 129.676324][T14446] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 129.684294][T14446] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 129.692302][T14446] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 129.700276][T14446] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 129.708259][T14446] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 10:09:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x6, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 129.751280][T14471] FAULT_INJECTION: forcing a failure. [ 129.751280][T14471] name failslab, interval 1, probability 0, space 0, times 0 [ 129.762713][T14470] FAULT_INJECTION: forcing a failure. [ 129.762713][T14470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 129.763936][T14471] CPU: 0 PID: 14471 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 129.785678][T14471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.795727][T14471] Call Trace: [ 129.798998][T14471] dump_stack_lvl+0xd6/0x122 [ 129.803580][T14471] dump_stack+0x11/0x1b [ 129.807721][T14471] should_fail+0x23c/0x250 [ 129.812122][T14471] __should_failslab+0x81/0x90 [ 129.816872][T14471] ? legacy_init_fs_context+0x2d/0x70 [ 129.822298][T14471] should_failslab+0x5/0x20 [ 129.826853][T14471] kmem_cache_alloc_trace+0x52/0x320 [ 129.832182][T14471] ? alloc_fs_context+0x46/0x500 [ 129.837108][T14471] legacy_init_fs_context+0x2d/0x70 [ 129.842295][T14471] alloc_fs_context+0x419/0x500 [ 129.847182][T14471] fs_context_for_reconfigure+0x42/0x50 [ 129.852718][T14471] path_mount+0x122a/0x1d20 [ 129.857240][T14471] __se_sys_mount+0x24b/0x2f0 [ 129.861920][T14471] __x64_sys_mount+0x63/0x70 [ 129.866502][T14471] do_syscall_64+0x44/0xa0 [ 129.870912][T14471] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.876805][T14471] RIP: 0033:0x7ff78c46ddfa [ 129.881205][T14471] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.900952][T14471] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 129.909356][T14471] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 129.917390][T14471] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 129.925345][T14471] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 129.933319][T14471] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 129.941277][T14471] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 129.949237][T14470] CPU: 1 PID: 14470 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 129.957998][T14470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.968055][T14470] Call Trace: [ 129.971334][T14470] dump_stack_lvl+0xd6/0x122 [ 129.975934][T14470] dump_stack+0x11/0x1b [ 129.980092][T14470] should_fail+0x23c/0x250 [ 129.984513][T14470] should_fail_usercopy+0x16/0x20 [ 129.989538][T14470] strncpy_from_user+0x21/0x250 [ 129.994389][T14470] getname_flags+0xb8/0x3f0 [ 129.998986][T14470] ? should_fail+0xd6/0x250 [ 130.003487][T14470] user_path_at_empty+0x28/0x110 [ 130.008432][T14470] __se_sys_mount+0x217/0x2f0 [ 130.013114][T14470] __x64_sys_mount+0x63/0x70 [ 130.017714][T14470] do_syscall_64+0x44/0xa0 [ 130.022143][T14470] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.028045][T14470] RIP: 0033:0x7f579e8dfdfa [ 130.032463][T14470] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.052065][T14470] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 130.060463][T14470] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa [ 130.068416][T14470] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 130.076372][T14470] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 130.084420][T14470] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 130.092370][T14470] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 10:09:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:15 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:15 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 10) 10:09:15 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 11) 10:09:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x7, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:15 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 9) [ 130.213573][T14489] FAULT_INJECTION: forcing a failure. [ 130.213573][T14489] name failslab, interval 1, probability 0, space 0, times 0 [ 130.226208][T14489] CPU: 1 PID: 14489 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 130.231658][T14494] FAULT_INJECTION: forcing a failure. [ 130.231658][T14494] name failslab, interval 1, probability 0, space 0, times 0 [ 130.235063][T14489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.235075][T14489] Call Trace: [ 130.235082][T14489] dump_stack_lvl+0xd6/0x122 [ 130.235105][T14489] dump_stack+0x11/0x1b [ 130.269853][T14489] should_fail+0x23c/0x250 [ 130.274276][T14489] __should_failslab+0x81/0x90 [ 130.279029][T14489] ? alloc_fs_context+0x46/0x500 [ 130.284011][T14489] should_failslab+0x5/0x20 [ 130.288500][T14489] kmem_cache_alloc_trace+0x52/0x320 [ 130.293771][T14489] alloc_fs_context+0x46/0x500 [ 130.298555][T14489] ? security_capable+0x91/0xa0 [ 130.303396][T14489] fs_context_for_reconfigure+0x42/0x50 [ 130.308956][T14489] path_mount+0x122a/0x1d20 [ 130.313521][T14489] __se_sys_mount+0x24b/0x2f0 [ 130.318270][T14489] __x64_sys_mount+0x63/0x70 [ 130.322864][T14489] do_syscall_64+0x44/0xa0 [ 130.327314][T14489] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.333245][T14489] RIP: 0033:0x7f579e8dfdfa [ 130.337685][T14489] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.357326][T14489] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 130.365724][T14489] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa [ 130.373773][T14489] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 130.381726][T14489] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 130.389688][T14489] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 130.397658][T14489] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 130.405736][T14494] CPU: 0 PID: 14494 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 130.414503][T14494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.418412][T14493] FAULT_INJECTION: forcing a failure. [ 130.418412][T14493] name failslab, interval 1, probability 0, space 0, times 0 [ 130.424611][T14494] Call Trace: [ 130.424622][T14494] dump_stack_lvl+0xd6/0x122 [ 130.445129][T14494] dump_stack+0x11/0x1b [ 130.449304][T14494] should_fail+0x23c/0x250 [ 130.453718][T14494] ? ext4_remount+0x67/0x1980 [ 130.458381][T14494] __should_failslab+0x81/0x90 [ 130.463148][T14494] should_failslab+0x5/0x20 [ 130.467639][T14494] __kmalloc_track_caller+0x6d/0x350 [ 130.472925][T14494] kstrdup+0x31/0x70 [ 130.476815][T14494] ext4_remount+0x67/0x1980 [ 130.481303][T14494] ? __cond_resched+0x11/0x40 [ 130.485982][T14494] ? __dentry_kill+0x456/0x4e0 [ 130.490767][T14494] ? shrink_dentry_list+0x30f/0x340 [ 130.496016][T14494] ? ext4_statfs+0x6b0/0x6b0 [ 130.500595][T14494] legacy_reconfigure+0x8e/0xa0 [ 130.505448][T14494] reconfigure_super+0x2d3/0x4f0 [ 130.510479][T14494] path_mount+0x145a/0x1d20 [ 130.515107][T14494] __se_sys_mount+0x24b/0x2f0 [ 130.519775][T14494] __x64_sys_mount+0x63/0x70 [ 130.524443][T14494] do_syscall_64+0x44/0xa0 [ 130.528848][T14494] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.534737][T14494] RIP: 0033:0x7ff78c46ddfa [ 130.539145][T14494] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.558897][T14494] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 130.567308][T14494] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 130.575395][T14494] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 130.583361][T14494] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 130.591394][T14494] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 130.599414][T14494] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 130.607373][T14493] CPU: 1 PID: 14493 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 130.616154][T14493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.626206][T14493] Call Trace: [ 130.629533][T14493] dump_stack_lvl+0xd6/0x122 [ 130.634131][T14493] dump_stack+0x11/0x1b [ 130.638288][T14493] should_fail+0x23c/0x250 [ 130.642766][T14493] __should_failslab+0x81/0x90 [ 130.647538][T14493] ? legacy_init_fs_context+0x2d/0x70 [ 130.652994][T14493] should_failslab+0x5/0x20 [ 130.657509][T14493] kmem_cache_alloc_trace+0x52/0x320 10:09:15 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 12) 10:09:15 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 10) 10:09:15 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x2, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x8, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 130.662858][T14493] ? alloc_fs_context+0x46/0x500 [ 130.667924][T14493] legacy_init_fs_context+0x2d/0x70 [ 130.673201][T14493] alloc_fs_context+0x419/0x500 [ 130.678068][T14493] fs_context_for_reconfigure+0x42/0x50 [ 130.683628][T14493] path_mount+0x122a/0x1d20 [ 130.688269][T14493] __se_sys_mount+0x24b/0x2f0 [ 130.692961][T14493] __x64_sys_mount+0x63/0x70 [ 130.697673][T14493] do_syscall_64+0x44/0xa0 [ 130.702147][T14493] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.708053][T14493] RIP: 0033:0x7fba0cc89dfa 10:09:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x9, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:15 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x3, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 130.712524][T14493] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.732173][T14493] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 130.740590][T14493] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 130.748633][T14493] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 130.756631][T14493] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 130.764643][T14493] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 130.772961][T14493] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 130.814293][T14524] FAULT_INJECTION: forcing a failure. [ 130.814293][T14524] name failslab, interval 1, probability 0, space 0, times 0 [ 130.827051][T14524] CPU: 1 PID: 14524 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 130.835963][T14524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.837089][T14525] FAULT_INJECTION: forcing a failure. [ 130.837089][T14525] name failslab, interval 1, probability 0, space 0, times 0 [ 130.846190][T14524] Call Trace: [ 130.846200][T14524] dump_stack_lvl+0xd6/0x122 [ 130.846223][T14524] dump_stack+0x11/0x1b [ 130.870899][T14524] should_fail+0x23c/0x250 [ 130.875309][T14524] __should_failslab+0x81/0x90 [ 130.880059][T14524] ? legacy_init_fs_context+0x2d/0x70 [ 130.885421][T14524] should_failslab+0x5/0x20 [ 130.889922][T14524] kmem_cache_alloc_trace+0x52/0x320 [ 130.895242][T14524] ? alloc_fs_context+0x46/0x500 [ 130.900165][T14524] legacy_init_fs_context+0x2d/0x70 [ 130.905359][T14524] alloc_fs_context+0x419/0x500 [ 130.910211][T14524] fs_context_for_reconfigure+0x42/0x50 [ 130.915892][T14524] path_mount+0x122a/0x1d20 [ 130.920408][T14524] __se_sys_mount+0x24b/0x2f0 [ 130.925167][T14524] __x64_sys_mount+0x63/0x70 [ 130.929771][T14524] do_syscall_64+0x44/0xa0 [ 130.934192][T14524] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.940180][T14524] RIP: 0033:0x7f579e8dfdfa [ 130.944680][T14524] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.964350][T14524] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 130.972749][T14524] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa [ 130.980724][T14524] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 130.988690][T14524] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 130.996662][T14524] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 131.004628][T14524] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 131.012599][T14525] CPU: 0 PID: 14525 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 131.021360][T14525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.031413][T14525] Call Trace: [ 131.034730][T14525] dump_stack_lvl+0xd6/0x122 [ 131.039330][T14525] dump_stack+0x11/0x1b [ 131.043505][T14525] should_fail+0x23c/0x250 [ 131.047974][T14525] __should_failslab+0x81/0x90 [ 131.052828][T14525] ? ext4_register_li_request+0x102/0x690 [ 131.058592][T14525] should_failslab+0x5/0x20 10:09:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file1\x00', 0x400, 0x12) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:16 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xa, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:16 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 11) 10:09:16 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x4, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:16 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 11) [ 131.063129][T14525] kmem_cache_alloc_trace+0x52/0x320 [ 131.068411][T14525] ext4_register_li_request+0x102/0x690 [ 131.073991][T14525] ext4_remount+0xf70/0x1980 [ 131.078647][T14525] ? __dentry_kill+0x456/0x4e0 [ 131.083426][T14525] ? ext4_statfs+0x6b0/0x6b0 [ 131.088047][T14525] legacy_reconfigure+0x8e/0xa0 [ 131.092913][T14525] reconfigure_super+0x2d3/0x4f0 [ 131.097900][T14525] path_mount+0x145a/0x1d20 [ 131.102413][T14525] __se_sys_mount+0x24b/0x2f0 [ 131.107102][T14525] __x64_sys_mount+0x63/0x70 10:09:16 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xb, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 131.111772][T14525] do_syscall_64+0x44/0xa0 [ 131.116202][T14525] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.122118][T14525] RIP: 0033:0x7ff78c46ddfa [ 131.126538][T14525] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.146317][T14525] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 131.154730][T14525] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 131.162715][T14525] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 131.170724][T14525] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 131.178695][T14525] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 131.186710][T14525] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 10:09:16 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 13) 10:09:16 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x5, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:16 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xc, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:16 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x6, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 131.212399][T14525] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 131.220993][T14551] FAULT_INJECTION: forcing a failure. [ 131.220993][T14551] name failslab, interval 1, probability 0, space 0, times 0 [ 131.233730][T14551] CPU: 0 PID: 14551 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 131.242494][T14551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.252570][T14551] Call Trace: [ 131.255843][T14551] dump_stack_lvl+0xd6/0x122 [ 131.260435][T14551] dump_stack+0x11/0x1b 10:09:16 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xd, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 131.264644][T14551] should_fail+0x23c/0x250 [ 131.269112][T14551] ? ext4_remount+0x67/0x1980 [ 131.273873][T14551] __should_failslab+0x81/0x90 [ 131.278723][T14551] should_failslab+0x5/0x20 [ 131.283311][T14551] __kmalloc_track_caller+0x6d/0x350 [ 131.288608][T14551] kstrdup+0x31/0x70 [ 131.292571][T14551] ext4_remount+0x67/0x1980 [ 131.297167][T14551] ? __cond_resched+0x11/0x40 [ 131.301873][T14551] ? __dentry_kill+0x456/0x4e0 [ 131.306649][T14551] ? shrink_dentry_list+0x30f/0x340 [ 131.311860][T14551] ? ext4_statfs+0x6b0/0x6b0 10:09:16 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x7, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 131.316521][T14551] legacy_reconfigure+0x8e/0xa0 [ 131.321465][T14551] reconfigure_super+0x2d3/0x4f0 [ 131.326412][T14551] path_mount+0x145a/0x1d20 [ 131.330931][T14551] __se_sys_mount+0x24b/0x2f0 [ 131.335691][T14551] __x64_sys_mount+0x63/0x70 [ 131.340282][T14551] do_syscall_64+0x44/0xa0 [ 131.344840][T14551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.350753][T14551] RIP: 0033:0x7f579e8dfdfa [ 131.355174][T14551] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.374783][T14551] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 131.383203][T14551] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa [ 131.391203][T14551] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 131.399172][T14551] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 131.407141][T14551] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 131.415143][T14551] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 131.423462][T14552] FAULT_INJECTION: forcing a failure. [ 131.423462][T14552] name failslab, interval 1, probability 0, space 0, times 0 [ 131.436091][T14552] CPU: 0 PID: 14552 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 131.444985][T14552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.455043][T14552] Call Trace: [ 131.458328][T14552] dump_stack_lvl+0xd6/0x122 [ 131.462924][T14552] dump_stack+0x11/0x1b [ 131.467121][T14552] should_fail+0x23c/0x250 [ 131.471543][T14552] ? ext4_remount+0x67/0x1980 [ 131.476243][T14552] __should_failslab+0x81/0x90 [ 131.480990][T14552] should_failslab+0x5/0x20 [ 131.485479][T14552] __kmalloc_track_caller+0x6d/0x350 [ 131.490821][T14552] ? __perf_event_task_sched_out+0xe6b/0xec0 [ 131.496791][T14552] kstrdup+0x31/0x70 [ 131.500811][T14552] ext4_remount+0x67/0x1980 [ 131.505293][T14552] ? __cond_resched+0x11/0x40 [ 131.509968][T14552] ? __dentry_kill+0x456/0x4e0 [ 131.514767][T14552] ? shrink_dentry_list+0x30f/0x340 [ 131.520008][T14552] ? ext4_statfs+0x6b0/0x6b0 [ 131.524586][T14552] legacy_reconfigure+0x8e/0xa0 [ 131.529558][T14552] reconfigure_super+0x2d3/0x4f0 [ 131.534495][T14552] path_mount+0x145a/0x1d20 [ 131.539180][T14552] __se_sys_mount+0x24b/0x2f0 [ 131.543873][T14552] __x64_sys_mount+0x63/0x70 [ 131.548465][T14552] do_syscall_64+0x44/0xa0 [ 131.552862][T14552] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.558901][T14552] RIP: 0033:0x7fba0cc89dfa [ 131.563295][T14552] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.582972][T14552] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 131.591518][T14552] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 131.599487][T14552] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 131.607575][T14552] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 131.615542][T14552] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 131.623497][T14552] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 131.636671][T14581] FAULT_INJECTION: forcing a failure. [ 131.636671][T14581] name failslab, interval 1, probability 0, space 0, times 0 [ 131.649351][T14581] CPU: 0 PID: 14581 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 131.658102][T14581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.668150][T14581] Call Trace: [ 131.671415][T14581] dump_stack_lvl+0xd6/0x122 [ 131.676077][T14581] dump_stack+0x11/0x1b [ 131.680227][T14581] should_fail+0x23c/0x250 [ 131.684620][T14581] __should_failslab+0x81/0x90 [ 131.689361][T14581] ? ext4_register_li_request+0x2b0/0x690 [ 131.695136][T14581] should_failslab+0x5/0x20 [ 131.699623][T14581] kmem_cache_alloc_trace+0x52/0x320 [ 131.704892][T14581] ? ext4_register_li_request+0x102/0x690 [ 131.710770][T14581] ext4_register_li_request+0x2b0/0x690 [ 131.716310][T14581] ext4_remount+0xf70/0x1980 [ 131.721026][T14581] ? __dentry_kill+0x456/0x4e0 [ 131.725778][T14581] ? ext4_statfs+0x6b0/0x6b0 [ 131.730350][T14581] legacy_reconfigure+0x8e/0xa0 [ 131.735255][T14581] reconfigure_super+0x2d3/0x4f0 [ 131.740170][T14581] path_mount+0x145a/0x1d20 [ 131.744775][T14581] __se_sys_mount+0x24b/0x2f0 [ 131.749711][T14581] __x64_sys_mount+0x63/0x70 [ 131.754295][T14581] do_syscall_64+0x44/0xa0 [ 131.758824][T14581] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.764788][T14581] RIP: 0033:0x7ff78c46ddfa [ 131.769203][T14581] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.788794][T14581] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 131.797191][T14581] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 131.805145][T14581] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 131.813150][T14581] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 131.821214][T14581] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 131.829169][T14581] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 131.841120][T14581] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:16 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xe, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:16 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x8, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:16 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 12) 10:09:16 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 12) 10:09:16 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 14) 10:09:17 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x9, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 131.948443][T14596] FAULT_INJECTION: forcing a failure. [ 131.948443][T14596] name failslab, interval 1, probability 0, space 0, times 0 [ 131.961092][T14596] CPU: 0 PID: 14596 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 131.969855][T14596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.979918][T14596] Call Trace: [ 131.983195][T14596] dump_stack_lvl+0xd6/0x122 [ 131.987790][T14596] dump_stack+0x11/0x1b [ 131.991952][T14596] should_fail+0x23c/0x250 10:09:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x10, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:17 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xa, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 131.996403][T14596] __should_failslab+0x81/0x90 [ 132.001260][T14596] ? ext4_register_li_request+0x102/0x690 [ 132.007069][T14596] should_failslab+0x5/0x20 [ 132.011623][T14596] kmem_cache_alloc_trace+0x52/0x320 [ 132.016922][T14596] ext4_register_li_request+0x102/0x690 [ 132.022488][T14596] ext4_remount+0xf70/0x1980 [ 132.027082][T14596] ? __dentry_kill+0x456/0x4e0 [ 132.031865][T14596] ? ext4_statfs+0x6b0/0x6b0 [ 132.036492][T14596] legacy_reconfigure+0x8e/0xa0 [ 132.041365][T14596] reconfigure_super+0x2d3/0x4f0 10:09:17 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xb, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 132.046310][T14596] path_mount+0x145a/0x1d20 [ 132.050856][T14596] __se_sys_mount+0x24b/0x2f0 [ 132.055533][T14596] __x64_sys_mount+0x63/0x70 [ 132.060175][T14596] do_syscall_64+0x44/0xa0 [ 132.064643][T14596] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.070592][T14596] RIP: 0033:0x7f579e8dfdfa [ 132.074998][T14596] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:09:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x11, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:17 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xc, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 132.094603][T14596] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 132.104060][T14596] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa [ 132.112120][T14596] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 132.120104][T14596] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 132.128075][T14596] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 132.136088][T14596] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 132.164565][T14596] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 132.173302][T14599] FAULT_INJECTION: forcing a failure. [ 132.173302][T14599] name failslab, interval 1, probability 0, space 0, times 0 [ 132.186049][T14599] CPU: 1 PID: 14599 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 132.195447][T14599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.205519][T14599] Call Trace: [ 132.208805][T14599] dump_stack_lvl+0xd6/0x122 [ 132.213425][T14599] dump_stack+0x11/0x1b [ 132.217671][T14599] should_fail+0x23c/0x250 [ 132.222099][T14599] __should_failslab+0x81/0x90 [ 132.226869][T14599] ? ext4_register_li_request+0x102/0x690 [ 132.232590][T14599] should_failslab+0x5/0x20 [ 132.237083][T14599] kmem_cache_alloc_trace+0x52/0x320 [ 132.242437][T14599] ext4_register_li_request+0x102/0x690 [ 132.247995][T14599] ext4_remount+0xf70/0x1980 [ 132.252802][T14599] ? __dentry_kill+0x456/0x4e0 [ 132.257655][T14599] ? ext4_statfs+0x6b0/0x6b0 [ 132.262262][T14599] legacy_reconfigure+0x8e/0xa0 [ 132.267103][T14599] reconfigure_super+0x2d3/0x4f0 [ 132.272020][T14599] path_mount+0x145a/0x1d20 [ 132.276671][T14599] __se_sys_mount+0x24b/0x2f0 [ 132.281348][T14599] __x64_sys_mount+0x63/0x70 [ 132.285922][T14599] do_syscall_64+0x44/0xa0 [ 132.290322][T14599] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.296199][T14599] RIP: 0033:0x7fba0cc89dfa [ 132.300720][T14599] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.320353][T14599] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 132.328753][T14599] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 132.336733][T14599] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 132.344828][T14599] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 132.352813][T14599] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 132.360779][T14599] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 132.373946][T14599] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 132.382594][T14598] FAULT_INJECTION: forcing a failure. [ 132.382594][T14598] name failslab, interval 1, probability 0, space 0, times 0 [ 132.395390][T14598] CPU: 1 PID: 14598 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 132.404150][T14598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.414207][T14598] Call Trace: [ 132.417482][T14598] dump_stack_lvl+0xd6/0x122 [ 132.422160][T14598] dump_stack+0x11/0x1b [ 132.426300][T14598] should_fail+0x23c/0x250 [ 132.430698][T14598] __should_failslab+0x81/0x90 [ 132.435513][T14598] ? __kthread_create_on_node+0x7c/0x2a0 [ 132.441138][T14598] should_failslab+0x5/0x20 [ 132.445793][T14598] kmem_cache_alloc_trace+0x52/0x320 [ 132.451169][T14598] ? strncmp+0x34/0x70 [ 132.455315][T14598] ? strcmp+0x23/0x50 [ 132.459303][T14598] ? ext4_journalled_writepage_callback+0x120/0x120 [ 132.465927][T14598] __kthread_create_on_node+0x7c/0x2a0 [ 132.471368][T14598] ? parse_options+0x14d7/0x1890 [ 132.476299][T14598] ? ext4_journalled_writepage_callback+0x120/0x120 [ 132.482978][T14598] kthread_create_on_node+0x86/0xb0 [ 132.488172][T14598] ? ext4_register_li_request+0x403/0x690 [ 132.493898][T14598] ext4_register_li_request+0x426/0x690 [ 132.499655][T14598] ext4_remount+0xf70/0x1980 [ 132.504236][T14598] ? __dentry_kill+0x456/0x4e0 [ 132.509070][T14598] ? ext4_statfs+0x6b0/0x6b0 [ 132.514045][T14598] legacy_reconfigure+0x8e/0xa0 [ 132.519130][T14598] reconfigure_super+0x2d3/0x4f0 [ 132.524078][T14598] path_mount+0x145a/0x1d20 [ 132.528592][T14598] __se_sys_mount+0x24b/0x2f0 [ 132.533296][T14598] __x64_sys_mount+0x63/0x70 [ 132.537886][T14598] do_syscall_64+0x44/0xa0 [ 132.542377][T14598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.548389][T14598] RIP: 0033:0x7ff78c46ddfa [ 132.552895][T14598] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.572921][T14598] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 132.581401][T14598] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa [ 132.589463][T14598] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 132.597491][T14598] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 132.605449][T14598] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 132.613416][T14598] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 132.621493][T14598] EXT4-fs: error -12 creating inode table initialization thread [ 132.630634][T14598] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:17 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xd, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:17 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 13) 10:09:17 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 13) 10:09:17 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 15) 10:09:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x12, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 132.786943][T14641] FAULT_INJECTION: forcing a failure. [ 132.786943][T14641] name failslab, interval 1, probability 0, space 0, times 0 [ 132.799695][T14641] CPU: 1 PID: 14641 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 132.808451][T14641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.818592][T14641] Call Trace: [ 132.821866][T14641] dump_stack_lvl+0xd6/0x122 [ 132.826541][T14641] dump_stack+0x11/0x1b [ 132.830694][T14641] should_fail+0x23c/0x250 10:09:17 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xe, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x14, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 132.835164][T14641] ? mempool_alloc_slab+0x16/0x20 [ 132.840188][T14641] __should_failslab+0x81/0x90 [ 132.844994][T14641] should_failslab+0x5/0x20 [ 132.849502][T14641] kmem_cache_alloc+0x4f/0x300 [ 132.854265][T14641] ? chksum_update+0x39/0x50 [ 132.858866][T14641] mempool_alloc_slab+0x16/0x20 [ 132.863750][T14641] ? mempool_free+0x130/0x130 [ 132.868602][T14641] mempool_alloc+0x9d/0x310 [ 132.873104][T14641] bio_alloc_bioset+0xcc/0x530 [ 132.877891][T14641] submit_bh_wbc+0x130/0x330 10:09:17 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x10, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 132.882514][T14641] ? ext4_update_super+0x71c/0x740 [ 132.887681][T14641] __sync_dirty_buffer+0x136/0x1e0 [ 132.892811][T14641] ext4_commit_super+0x1f6/0x290 [ 132.897749][T14641] ext4_remount+0xff7/0x1980 [ 132.902436][T14641] ? __dentry_kill+0x456/0x4e0 [ 132.907198][T14641] ? ext4_statfs+0x6b0/0x6b0 [ 132.911791][T14641] legacy_reconfigure+0x8e/0xa0 [ 132.916655][T14641] reconfigure_super+0x2d3/0x4f0 [ 132.921601][T14641] path_mount+0x145a/0x1d20 [ 132.926111][T14641] __se_sys_mount+0x24b/0x2f0 [ 132.930793][T14641] __x64_sys_mount+0x63/0x70 10:09:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x85, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:18 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x11, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 132.935382][T14641] do_syscall_64+0x44/0xa0 [ 132.939815][T14641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.945717][T14641] RIP: 0033:0x7ff78c46ddfa [ 132.950130][T14641] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.969815][T14641] RSP: 002b:00007ff78a1e3fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 132.978242][T14641] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c46ddfa 10:09:18 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x300, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 132.986317][T14641] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 132.994293][T14641] RBP: 00007ff78a1e4040 R08: 00007ff78a1e4040 R09: 0000000020000140 [ 133.002271][T14641] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 133.010243][T14641] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 133.027348][T14641] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 133.035956][T14650] FAULT_INJECTION: forcing a failure. [ 133.035956][T14650] name failslab, interval 1, probability 0, space 0, times 0 [ 133.048603][T14650] CPU: 0 PID: 14650 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 133.057783][T14650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.067834][T14650] Call Trace: [ 133.071112][T14650] dump_stack_lvl+0xd6/0x122 [ 133.075712][T14650] dump_stack+0x11/0x1b [ 133.079879][T14650] should_fail+0x23c/0x250 [ 133.084307][T14650] __should_failslab+0x81/0x90 [ 133.089080][T14650] should_failslab+0x5/0x20 [ 133.093658][T14650] kmem_cache_alloc_node+0x61/0x2c0 [ 133.098865][T14650] ? create_task_io_context+0x36/0x210 [ 133.104534][T14650] ? enqueue_entity+0x45b/0x630 [ 133.109372][T14650] create_task_io_context+0x36/0x210 [ 133.114646][T14650] submit_bio_checks+0x7c3/0x850 [ 133.119634][T14650] ? mempool_alloc_slab+0x16/0x20 [ 133.124645][T14650] submit_bio_noacct+0x33/0x7d0 [ 133.129531][T14650] submit_bio+0x10c/0x190 [ 133.133957][T14650] submit_bh_wbc+0x2f3/0x330 [ 133.138572][T14650] __sync_dirty_buffer+0x136/0x1e0 [ 133.143816][T14650] ext4_commit_super+0x1f6/0x290 [ 133.148744][T14650] ext4_remount+0xff7/0x1980 [ 133.153388][T14650] ? __dentry_kill+0x456/0x4e0 [ 133.158137][T14650] ? ext4_statfs+0x6b0/0x6b0 [ 133.162912][T14650] legacy_reconfigure+0x8e/0xa0 [ 133.167993][T14650] reconfigure_super+0x2d3/0x4f0 [ 133.172933][T14650] path_mount+0x145a/0x1d20 [ 133.177516][T14650] __se_sys_mount+0x24b/0x2f0 [ 133.182191][T14650] ? __schedule+0x435/0x680 [ 133.186702][T14650] __x64_sys_mount+0x63/0x70 [ 133.191462][T14650] do_syscall_64+0x44/0xa0 [ 133.195884][T14650] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.201779][T14650] RIP: 0033:0x7f579e8dfdfa [ 133.206182][T14650] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.225909][T14650] RSP: 002b:00007f579c655fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 133.234330][T14650] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8dfdfa [ 133.242303][T14650] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 133.250347][T14650] RBP: 00007f579c656040 R08: 00007f579c656040 R09: 0000000020000140 [ 133.258411][T14650] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 133.266370][T14650] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 133.281630][T14650] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 133.290161][T14647] FAULT_INJECTION: forcing a failure. [ 133.290161][T14647] name failslab, interval 1, probability 0, space 0, times 0 [ 133.303107][T14647] CPU: 0 PID: 14647 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 133.312202][T14647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.322257][T14647] Call Trace: [ 133.325524][T14647] dump_stack_lvl+0xd6/0x122 [ 133.330259][T14647] dump_stack+0x11/0x1b [ 133.334412][T14647] should_fail+0x23c/0x250 [ 133.338819][T14647] __should_failslab+0x81/0x90 [ 133.343576][T14647] should_failslab+0x5/0x20 [ 133.348241][T14647] kmem_cache_alloc_node+0x61/0x2c0 [ 133.353447][T14647] ? create_task_io_context+0x36/0x210 [ 133.358936][T14647] ? __d_add+0x3bf/0x490 [ 133.363261][T14647] create_task_io_context+0x36/0x210 [ 133.368557][T14647] submit_bio_checks+0x7c3/0x850 [ 133.373489][T14647] ? mempool_alloc_slab+0x16/0x20 [ 133.378519][T14647] submit_bio_noacct+0x33/0x7d0 [ 133.383447][T14647] submit_bio+0x10c/0x190 [ 133.387801][T14647] submit_bh_wbc+0x2f3/0x330 [ 133.392713][T14647] __sync_dirty_buffer+0x136/0x1e0 [ 133.398012][T14647] ext4_commit_super+0x1f6/0x290 [ 133.402954][T14647] ext4_remount+0xff7/0x1980 [ 133.407550][T14647] ? __dentry_kill+0x456/0x4e0 [ 133.412310][T14647] ? ext4_statfs+0x6b0/0x6b0 [ 133.416890][T14647] legacy_reconfigure+0x8e/0xa0 [ 133.421743][T14647] reconfigure_super+0x2d3/0x4f0 [ 133.426828][T14647] path_mount+0x145a/0x1d20 [ 133.431388][T14647] __se_sys_mount+0x24b/0x2f0 [ 133.436190][T14647] __x64_sys_mount+0x63/0x70 [ 133.440846][T14647] do_syscall_64+0x44/0xa0 [ 133.445261][T14647] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.451194][T14647] RIP: 0033:0x7fba0cc89dfa [ 133.455596][T14647] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.475308][T14647] RSP: 002b:00007fba0a9fffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 133.483740][T14647] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc89dfa [ 133.491719][T14647] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 133.499729][T14647] RBP: 00007fba0aa00040 R08: 00007fba0aa00040 R09: 0000000020000140 [ 133.507695][T14647] R10: 0000000000302424 R11: 0000000000000206 R12: 0000000020000140 [ 133.515725][T14647] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 133.529714][T14647] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:18 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x12, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:18 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 16) 10:09:18 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x500, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:18 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 14) 10:09:18 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 14) [ 133.687958][T14700] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 133.699284][T14700] FAULT_INJECTION: forcing a failure. [ 133.699284][T14700] name failslab, interval 1, probability 0, space 0, times 0 [ 133.703118][T14702] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 133.711935][T14700] CPU: 0 PID: 14700 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 133.727337][T14702] FAULT_INJECTION: forcing a failure. [ 133.727337][T14702] name failslab, interval 1, probability 0, space 0, times 0 [ 133.728997][T14700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.729009][T14700] Call Trace: [ 133.729016][T14700] dump_stack_lvl+0xd6/0x122 [ 133.759414][T14700] dump_stack+0x11/0x1b [ 133.763554][T14700] should_fail+0x23c/0x250 [ 133.767958][T14700] ? __alloc_file+0x2e/0x1a0 [ 133.772535][T14700] __should_failslab+0x81/0x90 [ 133.777288][T14700] should_failslab+0x5/0x20 [ 133.781784][T14700] kmem_cache_alloc+0x4f/0x300 [ 133.786533][T14700] __alloc_file+0x2e/0x1a0 [ 133.790936][T14700] alloc_empty_file+0xcd/0x1c0 [ 133.795690][T14700] path_openat+0x6a/0x1ec0 [ 133.800166][T14700] ? __perf_event_task_sched_out+0xe6b/0xec0 [ 133.806200][T14700] ? queue_work_on+0xab/0xd0 [ 133.810827][T14700] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 133.816103][T14700] ? rb_erase+0x4cb/0x750 [ 133.820425][T14700] ? finish_task_switch+0xce/0x290 [ 133.825525][T14700] do_filp_open+0x105/0x220 [ 133.830029][T14700] do_sys_openat2+0xb5/0x2b0 [ 133.834707][T14700] ? __se_sys_mount+0x26f/0x2f0 [ 133.839555][T14700] __x64_sys_openat+0xef/0x110 [ 133.844310][T14700] do_syscall_64+0x44/0xa0 [ 133.848715][T14700] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.854688][T14700] RIP: 0033:0x7ff78c41f7f4 [ 133.859203][T14700] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 133.878814][T14700] RSP: 002b:00007ff78a1e3f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 10:09:18 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x14, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 133.887219][T14700] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c41f7f4 [ 133.895175][T14700] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 133.903128][T14700] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000140 [ 133.911086][T14700] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 133.919047][T14700] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 [ 133.927028][T14702] CPU: 1 PID: 14702 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 10:09:19 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x600, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:19 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 17) [ 133.935789][T14702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.945848][T14702] Call Trace: [ 133.949126][T14702] dump_stack_lvl+0xd6/0x122 [ 133.953721][T14702] dump_stack+0x11/0x1b [ 133.957883][T14702] should_fail+0x23c/0x250 [ 133.962312][T14702] ? getname_flags+0x84/0x3f0 [ 133.967090][T14702] __should_failslab+0x81/0x90 [ 133.971915][T14702] should_failslab+0x5/0x20 [ 133.976462][T14702] kmem_cache_alloc+0x4f/0x300 [ 133.981238][T14702] getname_flags+0x84/0x3f0 10:09:19 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x9d, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:19 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x700, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 133.985831][T14702] getname+0x15/0x20 [ 133.989765][T14702] do_sys_openat2+0x6d/0x2b0 [ 133.994364][T14702] ? __se_sys_mount+0x26f/0x2f0 [ 133.999224][T14702] __x64_sys_openat+0xef/0x110 [ 134.004044][T14702] do_syscall_64+0x44/0xa0 [ 134.008529][T14702] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.014450][T14702] RIP: 0033:0x7f579e8917f4 [ 134.019126][T14702] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 10:09:19 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x300, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 134.038754][T14702] RSP: 002b:00007f579c655f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 134.047171][T14702] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8917f4 [ 134.055147][T14702] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 134.063233][T14702] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000140 [ 134.071201][T14702] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 134.079262][T14702] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 134.092265][T14704] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 134.108265][T14704] FAULT_INJECTION: forcing a failure. [ 134.108265][T14704] name failslab, interval 1, probability 0, space 0, times 0 [ 134.120919][T14704] CPU: 0 PID: 14704 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 134.129272][T14730] FAULT_INJECTION: forcing a failure. [ 134.129272][T14730] name failslab, interval 1, probability 0, space 0, times 0 [ 134.129674][T14704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.152285][T14704] Call Trace: [ 134.155560][T14704] dump_stack_lvl+0xd6/0x122 [ 134.160140][T14704] dump_stack+0x11/0x1b [ 134.164282][T14704] should_fail+0x23c/0x250 [ 134.168683][T14704] ? getname_flags+0x84/0x3f0 [ 134.173350][T14704] __should_failslab+0x81/0x90 [ 134.178114][T14704] should_failslab+0x5/0x20 [ 134.182617][T14704] kmem_cache_alloc+0x4f/0x300 [ 134.187388][T14704] getname_flags+0x84/0x3f0 [ 134.191920][T14704] getname+0x15/0x20 [ 134.195834][T14704] do_sys_openat2+0x6d/0x2b0 [ 134.200418][T14704] ? __se_sys_mount+0x26f/0x2f0 [ 134.205296][T14704] __x64_sys_openat+0xef/0x110 [ 134.210586][T14704] do_syscall_64+0x44/0xa0 [ 134.214994][T14704] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.220988][T14704] RIP: 0033:0x7fba0cc3b7f4 [ 134.225395][T14704] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 134.245072][T14704] RSP: 002b:00007fba0a9fff30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 134.253474][T14704] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc3b7f4 [ 134.261560][T14704] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 134.269548][T14704] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000140 [ 134.277507][T14704] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 134.285467][T14704] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 134.293424][T14730] CPU: 1 PID: 14730 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 134.302274][T14730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.312328][T14730] Call Trace: [ 134.315602][T14730] dump_stack_lvl+0xd6/0x122 [ 134.320239][T14730] dump_stack+0x11/0x1b [ 134.324445][T14730] should_fail+0x23c/0x250 [ 134.328880][T14730] ? security_file_alloc+0x30/0x190 [ 134.334143][T14730] __should_failslab+0x81/0x90 [ 134.338914][T14730] should_failslab+0x5/0x20 [ 134.343466][T14730] kmem_cache_alloc+0x4f/0x300 [ 134.348285][T14730] security_file_alloc+0x30/0x190 [ 134.353390][T14730] __alloc_file+0x83/0x1a0 [ 134.357851][T14730] alloc_empty_file+0xcd/0x1c0 [ 134.362632][T14730] path_openat+0x6a/0x1ec0 [ 134.367140][T14730] ? ext4_remount+0x1788/0x1980 [ 134.372167][T14730] ? __dentry_kill+0x456/0x4e0 [ 134.377002][T14730] do_filp_open+0x105/0x220 [ 134.381631][T14730] do_sys_openat2+0xb5/0x2b0 [ 134.386229][T14730] ? __se_sys_mount+0x26f/0x2f0 [ 134.391092][T14730] __x64_sys_openat+0xef/0x110 [ 134.395840][T14730] do_syscall_64+0x44/0xa0 [ 134.400254][T14730] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.406144][T14730] RIP: 0033:0x7ff78c41f7f4 [ 134.410599][T14730] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 134.430271][T14730] RSP: 002b:00007ff78a1e3f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 10:09:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:19 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x900, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:19 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 15) 10:09:19 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 15) 10:09:19 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x500, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:19 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 18) [ 134.438663][T14730] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff78c41f7f4 [ 134.446637][T14730] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 134.454586][T14730] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000140 [ 134.462535][T14730] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 134.470484][T14730] R13: 0000000020000000 R14: 00007ff78a1e4000 R15: 0000000020000840 10:09:19 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xa00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 134.530232][T14747] FAULT_INJECTION: forcing a failure. [ 134.530232][T14747] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.543326][T14747] CPU: 1 PID: 14747 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 134.552273][T14747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.562333][T14747] Call Trace: [ 134.565609][T14747] dump_stack_lvl+0xd6/0x122 [ 134.570223][T14747] dump_stack+0x11/0x1b [ 134.574387][T14747] should_fail+0x23c/0x250 10:09:19 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xb00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:19 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x600, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 134.578827][T14747] should_fail_usercopy+0x16/0x20 [ 134.583882][T14747] strncpy_from_user+0x21/0x250 [ 134.588742][T14747] getname_flags+0xb8/0x3f0 [ 134.593292][T14747] getname+0x15/0x20 [ 134.597193][T14747] do_sys_openat2+0x6d/0x2b0 [ 134.601782][T14747] ? __se_sys_mount+0x26f/0x2f0 [ 134.606872][T14747] __x64_sys_openat+0xef/0x110 [ 134.611650][T14747] do_syscall_64+0x44/0xa0 [ 134.616151][T14747] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.622059][T14747] RIP: 0033:0x7f579e8917f4 10:09:19 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x700, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 134.626505][T14747] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 134.646111][T14747] RSP: 002b:00007f579c655f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 134.654588][T14747] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8917f4 [ 134.662564][T14747] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 134.670544][T14747] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000140 10:09:19 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xc00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 134.678521][T14747] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 134.686492][T14747] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 134.695020][T14750] FAULT_INJECTION: forcing a failure. [ 134.695020][T14750] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.708198][T14750] CPU: 0 PID: 14750 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 134.716992][T14750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.722492][T14759] FAULT_INJECTION: forcing a failure. [ 134.722492][T14759] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.727122][T14750] Call Trace: [ 134.727133][T14750] dump_stack_lvl+0xd6/0x122 [ 134.747984][T14750] dump_stack+0x11/0x1b [ 134.752131][T14750] should_fail+0x23c/0x250 [ 134.756602][T14750] should_fail_usercopy+0x16/0x20 [ 134.761612][T14750] strncpy_from_user+0x21/0x250 [ 134.766456][T14750] getname_flags+0xb8/0x3f0 [ 134.770946][T14750] getname+0x15/0x20 [ 134.774844][T14750] do_sys_openat2+0x6d/0x2b0 [ 134.779420][T14750] ? __se_sys_mount+0x26f/0x2f0 [ 134.784260][T14750] __x64_sys_openat+0xef/0x110 [ 134.789052][T14750] do_syscall_64+0x44/0xa0 [ 134.793512][T14750] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.799447][T14750] RIP: 0033:0x7fba0cc3b7f4 [ 134.803845][T14750] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 10:09:19 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xd00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 134.823440][T14750] RSP: 002b:00007fba0a9fff30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 134.831835][T14750] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc3b7f4 [ 134.839789][T14750] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 134.847743][T14750] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000140 [ 134.855701][T14750] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 134.863809][T14750] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 134.872201][T14759] CPU: 1 PID: 14759 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 134.880961][T14759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.891079][T14759] Call Trace: [ 134.894424][T14759] dump_stack_lvl+0xd6/0x122 [ 134.899067][T14759] dump_stack+0x11/0x1b [ 134.903229][T14759] should_fail+0x23c/0x250 [ 134.907741][T14759] should_fail_usercopy+0x16/0x20 [ 134.913114][T14759] _copy_to_user+0x1c/0x90 [ 134.917634][T14759] simple_read_from_buffer+0xab/0x120 [ 134.923012][T14759] proc_fail_nth_read+0x10d/0x150 [ 134.928114][T14759] ? proc_fault_inject_write+0x230/0x230 [ 134.933770][T14759] vfs_read+0x1e6/0x750 [ 134.937946][T14759] ? __fget_light+0x21b/0x260 [ 134.942625][T14759] ? __cond_resched+0x11/0x40 [ 134.947291][T14759] ksys_read+0xd9/0x190 [ 134.951454][T14759] __x64_sys_read+0x3e/0x50 [ 134.955966][T14759] do_syscall_64+0x44/0xa0 [ 134.960425][T14759] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.966412][T14759] RIP: 0033:0x7ff78c41f48c [ 134.970827][T14759] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 134.990437][T14759] RSP: 002b:00007ff78a1e4170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 134.998960][T14759] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007ff78c41f48c [ 135.007023][T14759] RDX: 000000000000000f RSI: 00007ff78a1e41e0 RDI: 0000000000000003 [ 135.015056][T14759] RBP: 00007ff78a1e41d0 R08: 0000000000000000 R09: 0000000020000140 [ 135.023021][T14759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 135.031149][T14759] R13: 00007ffe011c933f R14: 00007ff78a1e4300 R15: 0000000000022000 10:09:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:20 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 16) 10:09:20 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 16) 10:09:20 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x900, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:20 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xe00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:20 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:20 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xa00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:20 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x1100, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 135.418231][T14798] FAULT_INJECTION: forcing a failure. [ 135.418231][T14798] name failslab, interval 1, probability 0, space 0, times 0 [ 135.431042][T14798] CPU: 1 PID: 14798 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 135.439894][T14798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.450192][T14798] Call Trace: [ 135.453604][T14798] dump_stack_lvl+0xd6/0x122 [ 135.458572][T14798] dump_stack+0x11/0x1b [ 135.462917][T14798] should_fail+0x23c/0x250 10:09:20 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:20 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x1200, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 135.467443][T14798] ? __alloc_file+0x2e/0x1a0 [ 135.472652][T14798] __should_failslab+0x81/0x90 [ 135.477447][T14798] should_failslab+0x5/0x20 [ 135.482034][T14798] kmem_cache_alloc+0x4f/0x300 [ 135.486803][T14798] ? kvm_sched_clock_read+0xd/0x20 [ 135.491918][T14798] __alloc_file+0x2e/0x1a0 [ 135.496455][T14798] alloc_empty_file+0xcd/0x1c0 [ 135.501370][T14798] path_openat+0x6a/0x1ec0 [ 135.505830][T14798] ? select_task_rq_fair+0x175/0xce0 [ 135.511137][T14798] ? rb_insert_color+0x7e/0x310 10:09:20 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xb00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:20 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x1400, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 135.515998][T14798] ? enqueue_entity+0x45b/0x630 [ 135.521502][T14798] ? enqueue_task_fair+0xdd/0x500 [ 135.526539][T14798] do_filp_open+0x105/0x220 [ 135.531187][T14798] do_sys_openat2+0xb5/0x2b0 [ 135.535809][T14798] ? __se_sys_mount+0x26f/0x2f0 [ 135.540675][T14798] __x64_sys_openat+0xef/0x110 [ 135.545444][T14798] do_syscall_64+0x44/0xa0 [ 135.549973][T14798] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.555871][T14798] RIP: 0033:0x7fba0cc3b7f4 [ 135.560284][T14798] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 135.580127][T14798] RSP: 002b:00007fba0a9fff30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 135.588584][T14798] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc3b7f4 [ 135.596557][T14798] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 135.604559][T14798] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000140 [ 135.612621][T14798] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 135.620587][T14798] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 [ 135.634334][T14802] FAULT_INJECTION: forcing a failure. [ 135.634334][T14802] name failslab, interval 1, probability 0, space 0, times 0 [ 135.647030][T14802] CPU: 0 PID: 14802 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 135.655827][T14802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.666255][T14802] Call Trace: [ 135.669539][T14802] dump_stack_lvl+0xd6/0x122 [ 135.674130][T14802] dump_stack+0x11/0x1b [ 135.678285][T14802] should_fail+0x23c/0x250 [ 135.682715][T14802] ? __alloc_file+0x2e/0x1a0 [ 135.687314][T14802] __should_failslab+0x81/0x90 [ 135.692140][T14802] should_failslab+0x5/0x20 [ 135.696651][T14802] kmem_cache_alloc+0x4f/0x300 [ 135.701403][T14802] __alloc_file+0x2e/0x1a0 [ 135.705853][T14802] alloc_empty_file+0xcd/0x1c0 [ 135.711125][T14802] path_openat+0x6a/0x1ec0 [ 135.715534][T14802] ? ext4_remount+0x1788/0x1980 [ 135.720393][T14802] ? __dentry_kill+0x456/0x4e0 [ 135.725223][T14802] do_filp_open+0x105/0x220 [ 135.729731][T14802] do_sys_openat2+0xb5/0x2b0 [ 135.734675][T14802] ? __se_sys_mount+0x26f/0x2f0 [ 135.739519][T14802] __x64_sys_openat+0xef/0x110 [ 135.744356][T14802] do_syscall_64+0x44/0xa0 [ 135.748852][T14802] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.754738][T14802] RIP: 0033:0x7f579e8917f4 [ 135.759129][T14802] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 135.778837][T14802] RSP: 002b:00007f579c655f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 135.787234][T14802] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8917f4 [ 135.795214][T14802] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 135.803706][T14802] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000140 [ 135.812157][T14802] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 135.820424][T14802] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 10:09:21 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x2000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:21 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:21 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 17) 10:09:21 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 17) 10:09:21 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xc00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 136.272208][T14852] FAULT_INJECTION: forcing a failure. [ 136.272208][T14852] name failslab, interval 1, probability 0, space 0, times 0 [ 136.273587][T14851] FAULT_INJECTION: forcing a failure. [ 136.273587][T14851] name failslab, interval 1, probability 0, space 0, times 0 [ 136.285642][T14852] CPU: 0 PID: 14852 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 136.307514][T14852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.318084][T14852] Call Trace: [ 136.321527][T14852] dump_stack_lvl+0xd6/0x122 [ 136.326462][T14852] dump_stack+0x11/0x1b [ 136.330909][T14852] should_fail+0x23c/0x250 [ 136.335407][T14852] ? security_file_alloc+0x30/0x190 [ 136.340831][T14852] __should_failslab+0x81/0x90 [ 136.345743][T14852] should_failslab+0x5/0x20 [ 136.350361][T14852] kmem_cache_alloc+0x4f/0x300 [ 136.355308][T14852] security_file_alloc+0x30/0x190 [ 136.360898][T14852] __alloc_file+0x83/0x1a0 [ 136.365662][T14852] alloc_empty_file+0xcd/0x1c0 [ 136.370508][T14852] path_openat+0x6a/0x1ec0 [ 136.374922][T14852] ? select_task_rq_fair+0x175/0xce0 [ 136.380382][T14852] ? rb_insert_color+0x7e/0x310 [ 136.385418][T14852] ? enqueue_entity+0x45b/0x630 [ 136.390350][T14852] ? enqueue_task_fair+0xdd/0x500 [ 136.395524][T14852] do_filp_open+0x105/0x220 [ 136.400232][T14852] do_sys_openat2+0xb5/0x2b0 [ 136.404893][T14852] ? __se_sys_mount+0x26f/0x2f0 [ 136.409917][T14852] __x64_sys_openat+0xef/0x110 [ 136.414878][T14852] do_syscall_64+0x44/0xa0 [ 136.419560][T14852] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.425589][T14852] RIP: 0033:0x7f579e8917f4 [ 136.430013][T14852] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 136.449789][T14852] RSP: 002b:00007f579c655f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 136.458290][T14852] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f579e8917f4 [ 136.466490][T14852] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 136.475332][T14852] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000140 [ 136.483555][T14852] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 136.491656][T14852] R13: 0000000020000000 R14: 00007f579c656000 R15: 0000000020000840 [ 136.499650][T14851] CPU: 1 PID: 14851 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 136.508449][T14851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.518713][T14851] Call Trace: 10:09:21 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 18) 10:09:21 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x8500, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:21 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xd00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 136.522083][T14851] dump_stack_lvl+0xd6/0x122 [ 136.526783][T14851] dump_stack+0x11/0x1b [ 136.530944][T14851] should_fail+0x23c/0x250 [ 136.535475][T14851] ? security_file_alloc+0x30/0x190 [ 136.540853][T14851] __should_failslab+0x81/0x90 [ 136.545629][T14851] should_failslab+0x5/0x20 [ 136.550139][T14851] kmem_cache_alloc+0x4f/0x300 [ 136.554914][T14851] security_file_alloc+0x30/0x190 [ 136.560415][T14851] __alloc_file+0x83/0x1a0 [ 136.564845][T14851] alloc_empty_file+0xcd/0x1c0 10:09:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) listen(r0, 0x80) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) [ 136.569805][T14851] path_openat+0x6a/0x1ec0 [ 136.574537][T14851] ? select_task_rq_fair+0x175/0xce0 [ 136.580139][T14851] ? rb_insert_color+0x7e/0x310 [ 136.585087][T14851] ? enqueue_entity+0x45b/0x630 [ 136.589982][T14851] ? enqueue_task_fair+0xdd/0x500 [ 136.595210][T14851] do_filp_open+0x105/0x220 [ 136.599821][T14851] do_sys_openat2+0xb5/0x2b0 [ 136.604439][T14851] ? __se_sys_mount+0x26f/0x2f0 [ 136.609301][T14851] __x64_sys_openat+0xef/0x110 [ 136.614075][T14851] do_syscall_64+0x44/0xa0 10:09:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:21 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x1000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 136.618500][T14851] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.624402][T14851] RIP: 0033:0x7fba0cc3b7f4 [ 136.628845][T14851] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 136.648625][T14851] RSP: 002b:00007fba0a9fff30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 136.657042][T14851] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba0cc3b7f4 [ 136.665031][T14851] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c 10:09:21 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xe00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 136.673135][T14851] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000140 [ 136.681143][T14851] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 136.689118][T14851] R13: 0000000020000000 R14: 00007fba0aa00000 R15: 0000000020000840 10:09:21 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x2000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 136.743306][T14886] FAULT_INJECTION: forcing a failure. [ 136.743306][T14886] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.756494][T14886] CPU: 0 PID: 14886 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 136.765296][T14886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.775348][T14886] Call Trace: [ 136.778660][T14886] dump_stack_lvl+0xd6/0x122 [ 136.783322][T14886] dump_stack+0x11/0x1b [ 136.787547][T14886] should_fail+0x23c/0x250 10:09:21 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:21 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) (fail_nth: 18) 10:09:21 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x3000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 136.791990][T14886] should_fail_usercopy+0x16/0x20 [ 136.797032][T14886] _copy_to_user+0x1c/0x90 [ 136.801547][T14886] simple_read_from_buffer+0xab/0x120 [ 136.806951][T14886] proc_fail_nth_read+0x10d/0x150 [ 136.812097][T14886] ? proc_fault_inject_write+0x230/0x230 [ 136.817829][T14886] vfs_read+0x1e6/0x750 [ 136.822258][T14886] ? __fget_light+0x21b/0x260 [ 136.827009][T14886] ? __cond_resched+0x11/0x40 [ 136.831691][T14886] ksys_read+0xd9/0x190 [ 136.835856][T14886] __x64_sys_read+0x3e/0x50 [ 136.840457][T14886] do_syscall_64+0x44/0xa0 [ 136.844888][T14886] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.850836][T14886] RIP: 0033:0x7f579e89148c [ 136.855390][T14886] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 136.875396][T14886] RSP: 002b:00007f579c656170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 136.884176][T14886] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f579e89148c 10:09:22 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:22 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x1100, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:22 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x4000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 136.892542][T14886] RDX: 000000000000000f RSI: 00007f579c6561e0 RDI: 0000000000000003 [ 136.900898][T14886] RBP: 00007f579c6561d0 R08: 0000000000000000 R09: 0000000020000140 [ 136.909313][T14886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 136.917481][T14886] R13: 00007fffda96235f R14: 00007f579c656300 R15: 0000000000022000 [ 136.945248][T14903] EXT4-fs: 14 callbacks suppressed [ 136.945260][T14903] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 136.971974][T14909] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 136.980918][T14903] FAULT_INJECTION: forcing a failure. [ 136.980918][T14903] name fail_usercopy, interval 1, probability 0, space 0, times 0 10:09:22 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x5000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:22 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 136.991344][T14916] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 136.994687][T14903] CPU: 0 PID: 14903 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 137.012513][T14903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.023223][T14903] Call Trace: [ 137.026589][T14903] dump_stack_lvl+0xd6/0x122 [ 137.031273][T14903] dump_stack+0x11/0x1b [ 137.035532][T14903] should_fail+0x23c/0x250 [ 137.040001][T14903] should_fail_usercopy+0x16/0x20 [ 137.045319][T14903] _copy_to_user+0x1c/0x90 [ 137.049751][T14903] simple_read_from_buffer+0xab/0x120 [ 137.055642][T14903] proc_fail_nth_read+0x10d/0x150 [ 137.061468][T14903] ? proc_fault_inject_write+0x230/0x230 [ 137.067228][T14903] vfs_read+0x1e6/0x750 [ 137.071457][T14903] ? __fget_light+0x21b/0x260 [ 137.076394][T14903] ? __cond_resched+0x11/0x40 [ 137.081536][T14903] ksys_read+0xd9/0x190 [ 137.084523][T14922] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 137.086136][T14903] __x64_sys_read+0x3e/0x50 [ 137.099727][T14903] do_syscall_64+0x44/0xa0 [ 137.105281][T14903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.111802][T14903] RIP: 0033:0x7fba0cc3b48c [ 137.116339][T14903] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 137.137533][T14903] RSP: 002b:00007fba0aa00170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 137.146395][T14903] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fba0cc3b48c [ 137.155059][T14903] RDX: 000000000000000f RSI: 00007fba0aa001e0 RDI: 0000000000000003 [ 137.163323][T14903] RBP: 00007fba0aa001d0 R08: 0000000000000000 R09: 0000000020000140 [ 137.171623][T14903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.179884][T14903] R13: 00007fff9826a9df R14: 00007fba0aa00300 R15: 0000000000022000 [ 137.206027][T14928] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 137.219856][T14933] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:22 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:22 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x6000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:22 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x1200, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:22 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:22 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:22 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:22 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x1400, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:22 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x7000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 137.596173][T14945] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 137.606545][T14951] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 137.618419][T14948] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:22 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:22 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x2000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 137.637861][T14958] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:22 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:22 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:23 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x8000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:23 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x9d00, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:23 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:23 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:23 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:23 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x1000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:23 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:23 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:23 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x9000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:23 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:23 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xa000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x2000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:24 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xb000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x3000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:24 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xc000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x4000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x9, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:24 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xd000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x5000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xe000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x6000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:24 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x10000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 10:09:24 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x9, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x7000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) 10:09:24 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x11000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) 10:09:24 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x8000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x12000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) 10:09:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x9000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xa000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:24 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x14000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:24 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:24 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xb000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:25 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x20000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:25 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xc000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:25 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x11, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x85000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c) 10:09:25 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xd000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:25 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x12, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x9effffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:25 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c) 10:09:25 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xe000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c) 10:09:25 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xeaffffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:25 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x10000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:25 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:25 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x11000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xefffffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x11, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x25, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xf0ffffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x12000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x12, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xfcffffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x14000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xfeffffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x85, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x20000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xffffff7f, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x9d000000, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x85, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x25, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x9effffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xffffff9e, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x2, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xeaffffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xffffffea, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x2, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xffffffef, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) (fail_nth: 1) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xefffffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 141.607418][T15470] FAULT_INJECTION: forcing a failure. [ 141.607418][T15470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.620641][T15470] CPU: 0 PID: 15470 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 141.629525][T15470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.639704][T15470] Call Trace: [ 141.642991][T15470] dump_stack_lvl+0xd6/0x122 [ 141.647617][T15470] dump_stack+0x11/0x1b [ 141.651797][T15470] should_fail+0x23c/0x250 10:09:26 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xfffffff0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xf0ffffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 141.656304][T15470] should_fail_usercopy+0x16/0x20 [ 141.661367][T15470] _copy_from_user+0x1c/0xd0 [ 141.665969][T15470] __sys_sendto+0x1fb/0x3e0 [ 141.670552][T15470] __x64_sys_sendto+0x74/0x90 [ 141.675291][T15470] do_syscall_64+0x44/0xa0 [ 141.679815][T15470] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.685721][T15470] RIP: 0033:0x7f9f934078d9 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xfcffffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xfffffffc, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 141.690199][T15470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 141.709904][T15470] RSP: 002b:00007f9f9117f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 141.718436][T15470] RAX: ffffffffffffffda RBX: 00007f9f9350bf60 RCX: 00007f9f934078d9 [ 141.726409][T15470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 141.734552][T15470] RBP: 00007f9f9117f1d0 R08: 0000000020000100 R09: 000000000000001c [ 141.742519][T15470] R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xfffffffe, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xfeffffff, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 141.750768][T15470] R13: 00007ffe3970ab2f R14: 00007f9f9117f300 R15: 0000000000022000 10:09:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) (fail_nth: 2) 10:09:26 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x4}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xffffff7f, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:26 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 141.896325][T15526] FAULT_INJECTION: forcing a failure. [ 141.896325][T15526] name failslab, interval 1, probability 0, space 0, times 0 [ 141.908992][T15526] CPU: 0 PID: 15526 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 141.917771][T15526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.927897][T15526] Call Trace: [ 141.931273][T15526] dump_stack_lvl+0xd6/0x122 [ 141.935871][T15526] dump_stack+0x11/0x1b [ 141.940038][T15526] should_fail+0x23c/0x250 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x29}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:27 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xffffff9e, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:27 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 141.944459][T15526] __should_failslab+0x81/0x90 [ 141.949263][T15526] ? tcp_sendmsg_locked+0x2069/0x24c0 [ 141.954668][T15526] should_failslab+0x5/0x20 [ 141.959249][T15526] kmem_cache_alloc_trace+0x52/0x320 [ 141.964540][T15526] tcp_sendmsg_locked+0x2069/0x24c0 [ 141.969847][T15526] ? __alloc_pages+0x194/0x320 [ 141.974643][T15526] ? cgroup_rstat_updated+0x34/0x100 [ 141.979947][T15526] ? _kstrtoull+0x301/0x320 [ 141.984467][T15526] ? _raw_spin_unlock_bh+0x33/0x40 [ 141.989583][T15526] ? lock_sock_nested+0x106/0x130 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x2b}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 141.994718][T15526] tcp_sendmsg+0x2c/0x40 [ 141.999087][T15526] inet6_sendmsg+0x5f/0x80 [ 142.003505][T15526] __sys_sendto+0x302/0x3e0 [ 142.008098][T15526] __x64_sys_sendto+0x74/0x90 [ 142.012850][T15526] do_syscall_64+0x44/0xa0 [ 142.017304][T15526] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.023229][T15526] RIP: 0033:0x7f9f934078d9 [ 142.027668][T15526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.047361][T15526] RSP: 002b:00007f9f9117f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 142.056015][T15526] RAX: ffffffffffffffda RBX: 00007f9f9350bf60 RCX: 00007f9f934078d9 [ 142.063987][T15526] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 142.071965][T15526] RBP: 00007f9f9117f1d0 R08: 0000000020000100 R09: 000000000000001c [ 142.080013][T15526] R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 [ 142.088023][T15526] R13: 00007ffe3970ab2f R14: 00007f9f9117f300 R15: 0000000000022000 10:09:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) (fail_nth: 3) 10:09:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xffffffea, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x33}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 142.135595][T15559] EXT4-fs: 149 callbacks suppressed [ 142.135631][T15559] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 142.154122][T15562] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 142.155814][T15574] FAULT_INJECTION: forcing a failure. [ 142.155814][T15574] name failslab, interval 1, probability 0, space 0, times 0 [ 142.165588][T15565] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x3c}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 142.175275][T15574] CPU: 0 PID: 15574 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 142.175298][T15574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.175309][T15574] Call Trace: [ 142.189328][T15569] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 142.192436][T15574] dump_stack_lvl+0xd6/0x122 [ 142.192463][T15574] dump_stack+0x11/0x1b [ 142.192479][T15574] should_fail+0x23c/0x250 [ 142.227857][T15574] ? __inet_hash_connect+0x5ce/0x950 10:09:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xffffffef, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 142.233143][T15574] __should_failslab+0x81/0x90 [ 142.233343][T15575] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 142.237982][T15574] should_failslab+0x5/0x20 [ 142.238011][T15574] kmem_cache_alloc+0x4f/0x300 [ 142.251271][T15576] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 142.255547][T15574] __inet_hash_connect+0x5ce/0x950 [ 142.255577][T15574] ? inet6_hash_connect+0x80/0x80 [ 142.274226][T15574] inet6_hash_connect+0x77/0x80 [ 142.279527][T15574] tcp_v6_connect+0x9c3/0xbf0 10:09:27 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 142.284312][T15574] ? avc_has_perm+0x70/0x160 [ 142.289134][T15574] __inet_stream_connect+0x156/0x6e0 [ 142.294432][T15574] ? kmem_cache_alloc_trace+0x221/0x320 [ 142.300079][T15574] ? tcp_sendmsg_locked+0x2069/0x24c0 [ 142.305468][T15574] tcp_sendmsg_locked+0x2373/0x24c0 [ 142.311049][T15574] ? __alloc_pages+0x194/0x320 [ 142.315936][T15574] ? cgroup_rstat_updated+0x34/0x100 [ 142.321327][T15574] ? _kstrtoull+0x301/0x320 [ 142.325891][T15574] ? _raw_spin_unlock_bh+0x33/0x40 [ 142.331124][T15574] ? lock_sock_nested+0x106/0x130 10:09:27 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:27 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xfffffff0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 142.336328][T15574] tcp_sendmsg+0x2c/0x40 [ 142.340709][T15574] inet6_sendmsg+0x5f/0x80 [ 142.345324][T15574] __sys_sendto+0x302/0x3e0 [ 142.349923][T15574] __x64_sys_sendto+0x74/0x90 [ 142.354626][T15574] do_syscall_64+0x44/0xa0 [ 142.359249][T15574] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.365366][T15574] RIP: 0033:0x7f9f934078d9 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 142.370131][T15574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.390043][T15574] RSP: 002b:00007f9f9117f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 142.398474][T15574] RAX: ffffffffffffffda RBX: 00007f9f9350bf60 RCX: 00007f9f934078d9 [ 142.406576][T15574] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 142.414565][T15574] RBP: 00007f9f9117f1d0 R08: 0000000020000100 R09: 000000000000001c [ 142.422669][T15574] R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 10:09:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xfffffffc, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 142.430752][T15574] R13: 00007ffe3970ab2f R14: 00007f9f9117f300 R15: 0000000000022000 10:09:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) (fail_nth: 4) 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0xfffffffe, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:27 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:27 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 142.483423][T15608] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 142.496275][T15610] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 142.507541][T15611] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 142.517485][T15615] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 142.562326][T15626] FAULT_INJECTION: forcing a failure. [ 142.562326][T15626] name failslab, interval 1, probability 0, space 0, times 0 [ 142.574968][T15626] CPU: 1 PID: 15626 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 142.583733][T15626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.593789][T15626] Call Trace: [ 142.597070][T15626] dump_stack_lvl+0xd6/0x122 [ 142.601678][T15626] dump_stack+0x11/0x1b [ 142.605917][T15626] should_fail+0x23c/0x250 10:09:27 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x4}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x3, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 142.610599][T15626] __should_failslab+0x81/0x90 [ 142.615366][T15626] should_failslab+0x5/0x20 [ 142.620018][T15626] kmem_cache_alloc_node+0x61/0x2c0 [ 142.625222][T15626] ? __alloc_skb+0xed/0x420 [ 142.629724][T15626] ? __sk_dst_check+0x71/0xe0 [ 142.634398][T15626] __alloc_skb+0xed/0x420 [ 142.638732][T15626] sk_stream_alloc_skb+0x161/0x600 [ 142.643850][T15626] ? tcp_write_queue_purge+0x291/0x2b0 [ 142.649351][T15626] tcp_connect+0xc34/0x1dc0 [ 142.653897][T15626] ? tcp_fastopen_defer_connect+0x6e/0x1f0 10:09:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x29}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 142.659709][T15626] tcp_v6_connect+0xba0/0xbf0 [ 142.664399][T15626] ? avc_has_perm+0x70/0x160 [ 142.668996][T15626] __inet_stream_connect+0x156/0x6e0 [ 142.674332][T15626] ? kmem_cache_alloc_trace+0x221/0x320 [ 142.679963][T15626] ? tcp_sendmsg_locked+0x2069/0x24c0 [ 142.685335][T15626] tcp_sendmsg_locked+0x2373/0x24c0 [ 142.690629][T15626] ? __alloc_pages+0x194/0x320 [ 142.695401][T15626] ? cgroup_rstat_updated+0x34/0x100 [ 142.700707][T15626] ? _kstrtoull+0x301/0x320 [ 142.705238][T15626] ? _raw_spin_unlock_bh+0x33/0x40 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x4, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 142.710356][T15626] ? lock_sock_nested+0x106/0x130 [ 142.715386][T15626] tcp_sendmsg+0x2c/0x40 [ 142.719635][T15626] inet6_sendmsg+0x5f/0x80 [ 142.724055][T15626] __sys_sendto+0x302/0x3e0 [ 142.728585][T15626] __x64_sys_sendto+0x74/0x90 [ 142.733263][T15626] do_syscall_64+0x44/0xa0 [ 142.737775][T15626] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.743874][T15626] RIP: 0033:0x7f9f934078d9 10:09:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x2b}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x5, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 142.748292][T15626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.767895][T15626] RSP: 002b:00007f9f9117f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 142.776355][T15626] RAX: ffffffffffffffda RBX: 00007f9f9350bf60 RCX: 00007f9f934078d9 [ 142.784637][T15626] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 142.792608][T15626] RBP: 00007f9f9117f1d0 R08: 0000000020000100 R09: 000000000000001c [ 142.800664][T15626] R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 [ 142.808711][T15626] R13: 00007ffe3970ab2f R14: 00007f9f9117f300 R15: 0000000000022000 10:09:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) (fail_nth: 5) 10:09:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x33}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x6, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:27 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:27 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:27 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 142.916773][T15689] FAULT_INJECTION: forcing a failure. [ 142.916773][T15689] name failslab, interval 1, probability 0, space 0, times 0 [ 142.929482][T15689] CPU: 0 PID: 15689 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 142.938247][T15689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.948406][T15689] Call Trace: [ 142.951721][T15689] dump_stack_lvl+0xd6/0x122 [ 142.956330][T15689] dump_stack+0x11/0x1b [ 142.960565][T15689] should_fail+0x23c/0x250 10:09:28 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x3c}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:28 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:28 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x7, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:28 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x900, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 142.965042][T15689] __should_failslab+0x81/0x90 [ 142.969836][T15689] should_failslab+0x5/0x20 [ 142.974397][T15689] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 142.980208][T15689] ? __kmalloc_node_track_caller+0x30/0x40 [ 142.986022][T15689] __kmalloc_node_track_caller+0x30/0x40 [ 142.991661][T15689] ? sk_stream_alloc_skb+0x161/0x600 [ 142.996980][T15689] __alloc_skb+0x187/0x420 [ 143.001461][T15689] sk_stream_alloc_skb+0x161/0x600 [ 143.006582][T15689] ? tcp_write_queue_purge+0x291/0x2b0 [ 143.012115][T15689] tcp_connect+0xc34/0x1dc0 10:09:28 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:28 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x8, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 143.016825][T15689] ? tcp_fastopen_defer_connect+0x6e/0x1f0 [ 143.022782][T15689] tcp_v6_connect+0xba0/0xbf0 [ 143.027521][T15689] ? avc_has_perm+0x70/0x160 [ 143.032333][T15689] __inet_stream_connect+0x156/0x6e0 [ 143.037648][T15689] ? kmem_cache_alloc_trace+0x221/0x320 [ 143.043200][T15689] ? tcp_sendmsg_locked+0x2069/0x24c0 [ 143.048634][T15689] tcp_sendmsg_locked+0x2373/0x24c0 [ 143.053878][T15689] ? __alloc_pages+0x194/0x320 [ 143.058665][T15689] ? cgroup_rstat_updated+0x34/0x100 [ 143.064026][T15689] ? _kstrtoull+0x301/0x320 [ 143.068604][T15689] ? _raw_spin_unlock_bh+0x33/0x40 [ 143.073728][T15689] ? lock_sock_nested+0x106/0x130 [ 143.078760][T15689] tcp_sendmsg+0x2c/0x40 [ 143.083007][T15689] inet6_sendmsg+0x5f/0x80 [ 143.087423][T15689] __sys_sendto+0x302/0x3e0 [ 143.091928][T15689] __x64_sys_sendto+0x74/0x90 [ 143.096615][T15689] do_syscall_64+0x44/0xa0 [ 143.101044][T15689] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.107013][T15689] RIP: 0033:0x7f9f934078d9 [ 143.111527][T15689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.131214][T15689] RSP: 002b:00007f9f9117f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 143.140148][T15689] RAX: ffffffffffffffda RBX: 00007f9f9350bf60 RCX: 00007f9f934078d9 [ 143.148285][T15689] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 143.156383][T15689] RBP: 00007f9f9117f1d0 R08: 0000000020000100 R09: 000000000000001c 10:09:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) (fail_nth: 6) 10:09:28 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:28 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x9, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 143.164819][T15689] R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 [ 143.173069][T15689] R13: 00007ffe3970ab2f R14: 00007f9f9117f300 R15: 0000000000022000 10:09:28 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:28 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0xa, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:28 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 143.235087][T15730] FAULT_INJECTION: forcing a failure. [ 143.235087][T15730] name failslab, interval 1, probability 0, space 0, times 0 [ 143.248231][T15730] CPU: 0 PID: 15730 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 143.257086][T15730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.267301][T15730] Call Trace: [ 143.270680][T15730] dump_stack_lvl+0xd6/0x122 [ 143.275279][T15730] dump_stack+0x11/0x1b [ 143.279617][T15730] should_fail+0x23c/0x250 10:09:28 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:28 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:28 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0xb, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 143.284126][T15730] __should_failslab+0x81/0x90 [ 143.289187][T15730] should_failslab+0x5/0x20 [ 143.293772][T15730] kmem_cache_alloc_node+0x61/0x2c0 [ 143.299066][T15730] ? __alloc_skb+0xed/0x420 [ 143.303642][T15730] __alloc_skb+0xed/0x420 [ 143.307979][T15730] alloc_skb_with_frags+0x90/0x390 [ 143.313317][T15730] sock_alloc_send_pskb+0x436/0x4e0 [ 143.319177][T15730] ? fib6_table_lookup+0x530/0x5e0 [ 143.324592][T15730] sock_alloc_send_skb+0x2d/0x40 [ 143.329680][T15730] __ip6_append_data+0x17f3/0x22c0 10:09:28 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 143.334955][T15730] ? ip6_route_output_flags_noref+0x1b0/0x1b0 [ 143.341371][T15730] ? fib6_rule_lookup+0x85/0x160 [ 143.346518][T15730] ip6_append_data+0x17e/0x230 [ 143.351454][T15730] ? icmpv6_xrlim_allow+0x220/0x220 [ 143.356880][T15730] ? icmpv6_xrlim_allow+0x220/0x220 [ 143.362196][T15730] icmp6_send+0xec5/0x1380 [ 143.367071][T15730] ip6_pkt_drop+0x303/0x340 [ 143.371663][T15730] ip6_pkt_discard_out+0x43/0x50 [ 143.376791][T15730] ip6_xmit+0x7be/0x9a0 [ 143.380964][T15730] ? ip6_xmit+0x9a0/0x9a0 10:09:28 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0xc, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 143.385372][T15730] ? inet6_csk_route_socket+0x26d/0x3b0 [ 143.391260][T15730] inet6_csk_xmit+0x19f/0x1d0 [ 143.396119][T15730] __tcp_transmit_skb+0x142a/0x1a00 [ 143.401362][T15730] tcp_connect+0x1a8d/0x1dc0 [ 143.405948][T15730] ? tcp_fastopen_defer_connect+0x6e/0x1f0 [ 143.412014][T15730] tcp_v6_connect+0xba0/0xbf0 [ 143.416781][T15730] ? avc_has_perm+0x70/0x160 [ 143.421389][T15730] __inet_stream_connect+0x156/0x6e0 [ 143.426681][T15730] ? kmem_cache_alloc_trace+0x221/0x320 10:09:28 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0xd, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 143.432234][T15730] ? tcp_sendmsg_locked+0x2069/0x24c0 [ 143.437698][T15730] tcp_sendmsg_locked+0x2373/0x24c0 [ 143.442898][T15730] ? __alloc_pages+0x194/0x320 [ 143.447676][T15730] ? cgroup_rstat_updated+0x34/0x100 [ 143.453014][T15730] ? _kstrtoull+0x301/0x320 [ 143.457528][T15730] ? _raw_spin_unlock_bh+0x33/0x40 [ 143.462718][T15730] ? lock_sock_nested+0x106/0x130 [ 143.467758][T15730] tcp_sendmsg+0x2c/0x40 [ 143.472099][T15730] inet6_sendmsg+0x5f/0x80 [ 143.476585][T15730] __sys_sendto+0x302/0x3e0 [ 143.481192][T15730] __x64_sys_sendto+0x74/0x90 [ 143.485899][T15730] do_syscall_64+0x44/0xa0 [ 143.490322][T15730] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.496329][T15730] RIP: 0033:0x7f9f934078d9 [ 143.500758][T15730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.520434][T15730] RSP: 002b:00007f9f9117f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 143.528971][T15730] RAX: ffffffffffffffda RBX: 00007f9f9350bf60 RCX: 00007f9f934078d9 [ 143.536989][T15730] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 143.545639][T15730] RBP: 00007f9f9117f1d0 R08: 0000000020000100 R09: 000000000000001c [ 143.553743][T15730] R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 [ 143.561927][T15730] R13: 00007ffe3970ab2f R14: 00007f9f9117f300 R15: 0000000000022000 10:09:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:29 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x3, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:29 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0xe, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:29 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:29 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:29 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:29 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x10, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 144.066241][T15730] syz-executor.1 (15730) used greatest stack depth: 10000 bytes left 10:09:29 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x4, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:29 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:29 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:29 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:29 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x11, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x2, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:30 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x900, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x5, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:30 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x12, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:30 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x6, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:30 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x14, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:30 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x7, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x3, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:30 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x85, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:30 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1100, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x8, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:30 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x9, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:30 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1200, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:30 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x2}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:30 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:31 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0xa, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x4, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:31 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:31 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:31 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x3}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:31 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:31 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0xb, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:31 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x4}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:31 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0xc, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:31 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:31 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:31 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:31 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x5}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x5, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:32 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10c9, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:32 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0xd, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:32 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:32 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:32 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:32 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0xe, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:32 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x7}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 147.593277][T15984] EXT4-fs: 74 callbacks suppressed [ 147.593288][T15984] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 147.612902][T15986] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 147.625713][T15989] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:32 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2500, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:32 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x10, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:32 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x8}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:32 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 147.636291][T15995] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 147.647110][T15999] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 147.658292][T16001] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 147.721761][T16015] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 147.746178][T16022] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 147.756640][T16016] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 147.771345][T16025] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x6, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:33 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1100, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:33 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x11, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:33 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x9}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:33 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:33 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:33 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1200, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:33 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xa}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:33 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xb}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:33 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:33 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x12, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:33 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x7, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:34 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xc}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:34 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:34 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:34 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x14, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:34 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:34 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:34 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xd}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:34 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:34 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x9d, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:34 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:34 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x8, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:35 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:35 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x2}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:35 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:35 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:35 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x10}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:35 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x3}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:35 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x4}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:35 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:35 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x11}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:35 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2500, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:35 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:36 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x12}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xf, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:36 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x5}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:36 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:36 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6800, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:36 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:36 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:36 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:36 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x14}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:36 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:36 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:36 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x7}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:36 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x10, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:36 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x8}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:36 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:36 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:36 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x85}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:36 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7400, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:37 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x9}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:37 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:37 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:37 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xa}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:37 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:37 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:37 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xb}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x11, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:37 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:37 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:37 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xc}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x600}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 152.831982][T16286] EXT4-fs: 62 callbacks suppressed [ 152.831996][T16286] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 152.851268][T16283] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 152.861726][T16285] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:37 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:38 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:38 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xd}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:38 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 152.876268][T16295] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 152.886507][T16296] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 152.899574][T16302] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:38 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x700}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 152.956742][T16311] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 152.984358][T16314] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 152.996092][T16321] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:38 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 153.006270][T16322] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x24, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:38 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:38 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x900}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:38 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6800, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:38 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:38 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x10}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:38 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x11}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:38 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:38 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xa00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:38 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:38 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:38 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7400, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x58, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:39 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x12}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:39 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xb00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:39 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:39 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:39 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:39 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x14}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:39 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xc00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:39 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:39 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:39 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc910, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:39 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x9d}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x5c, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:40 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xd00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:40 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:40 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffefffff00000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:40 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:40 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:40 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xe00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:40 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:40 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:40 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:40 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:40 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x60, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:41 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x600}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:41 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:41 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1100}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:41 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:41 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:41 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1200}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:41 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:41 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe0ffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:41 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x700}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:41 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:41 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1400}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x84, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:42 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x900}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:42 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:42 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:42 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:42 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x2000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:42 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xa00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:42 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:42 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:42 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x8500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:42 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:42 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfc, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:43 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:43 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:43 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xb00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:43 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:43 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:43 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xc00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:43 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 158.069514][T16596] EXT4-fs: 68 callbacks suppressed [ 158.069528][T16596] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 158.085807][T16598] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 158.096197][T16604] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 158.105637][T16600] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:43 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:43 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x9000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 158.115790][T16608] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 158.125399][T16609] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:43 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:43 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xd00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 158.167341][T16620] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 158.201936][T16625] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 158.212495][T16626] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 158.236645][T16630] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x1f4, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:43 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x3000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:43 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xe00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:43 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x18, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:43 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:43 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:44 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1100}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:44 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:44 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x4000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:44 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x22, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:44 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:44 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1200}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x218, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:44 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x5000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:44 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:44 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:44 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:44 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1400}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:44 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:44 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:44 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x300, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:44 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x2000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:44 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x6000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:44 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x9000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:45 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x241, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:45 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x9d00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:45 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x7000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:45 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:45 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x700, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:45 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x8000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:45 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x9000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:45 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:45 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1800, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:45 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:45 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:45 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xa000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:45 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x11000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:46 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x300, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:46 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:46 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2200, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:46 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xb000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:46 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x12000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:46 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x3000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:46 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:46 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xc000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:46 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e00, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:46 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x4000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:46 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:46 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xd000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:47 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3f00, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:47 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x3e8, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:47 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x5000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xe000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:47 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:47 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x6000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:47 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x7000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:47 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:47 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x10000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:47 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x11000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:47 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x40000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x4b8, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:48 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x11000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:48 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x8000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:48 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x25000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:48 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x12000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:48 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x80000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:48 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x9000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:48 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x14000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 163.350414][T16923] EXT4-fs: 68 callbacks suppressed [ 163.350426][T16923] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 163.370755][T16926] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 163.381574][T16928] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:48 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xa000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:48 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:48 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3ff7f8, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:48 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x12000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 163.401635][T16937] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 163.411972][T16942] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 163.429186][T16940] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 163.510095][T16958] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 163.519647][T16957] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 163.529137][T16964] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 163.538976][T16961] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:49 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xb000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x500, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:49 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:49 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x20000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:49 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3ff800, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:49 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:49 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x85000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:49 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xc000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:49 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xf83f00, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:49 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:49 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:49 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x9effffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:49 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xd000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x600, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:50 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:50 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:50 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xeaffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:50 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xe000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xefffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:50 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x25000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:50 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:50 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x10000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:50 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x700, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:51 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x11000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xfcffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x12000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xfeffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x14000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xffffff7f}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xf00, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:51 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x20000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xffffff9e}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x9d000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xffffffea}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:51 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:51 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x18000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:52 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x9effffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x1100, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:52 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:52 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:52 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x22000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:52 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xffffffef}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:52 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xeaffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:52 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:52 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:52 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xefffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:52 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xfffffff0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:52 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:52 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 167.855378][ T1112] ================================================================== [ 167.863481][ T1112] BUG: KCSAN: data-race in fsnotify_perm / shrink_dentry_list [ 167.870923][ T1112] [ 167.873227][ T1112] write to 0xffff88810132b0c0 of 4 bytes by task 17224 on cpu 0: [ 167.880916][ T1112] shrink_dentry_list+0x127/0x340 [ 167.885920][ T1112] shrink_dcache_sb+0x188/0x2d0 [ 167.890747][ T1112] reconfigure_super+0x2aa/0x4f0 [ 167.895661][ T1112] path_mount+0x145a/0x1d20 [ 167.900144][ T1112] __se_sys_mount+0x24b/0x2f0 [ 167.904797][ T1112] __x64_sys_mount+0x63/0x70 [ 167.909370][ T1112] do_syscall_64+0x44/0xa0 [ 167.913772][ T1112] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.919648][ T1112] [ 167.921950][ T1112] read to 0xffff88810132b0c0 of 4 bytes by task 1112 on cpu 1: [ 167.929465][ T1112] fsnotify_perm+0x2ce/0x370 [ 167.934078][ T1112] security_file_open+0x85/0x90 [ 167.938909][ T1112] do_dentry_open+0x232/0x860 [ 167.943564][ T1112] vfs_open+0x43/0x50 [ 167.947527][ T1112] path_openat+0x17c3/0x1ec0 [ 167.952097][ T1112] do_filp_open+0x105/0x220 [ 167.956578][ T1112] do_sys_openat2+0xb5/0x2b0 [ 167.961202][ T1112] __x64_sys_openat+0xef/0x110 [ 167.965955][ T1112] do_syscall_64+0x44/0xa0 [ 167.970362][ T1112] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.976242][ T1112] [ 167.978685][ T1112] value changed: 0x00280440 -> 0x00200040 [ 167.984382][ T1112] [ 167.986687][ T1112] Reported by Kernel Concurrency Sanitizer on: [ 167.992809][ T1112] CPU: 1 PID: 1112 Comm: syz-executor.5 Not tainted 5.15.0-rc5-syzkaller #0 [ 168.001462][ T1112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.011495][ T1112] ================================================================== 10:09:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x1802, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:53 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:53 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:53 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:53 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xfffffffc}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:53 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:53 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xfffffffe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:53 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xfcffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 168.605169][T17236] EXT4-fs: 68 callbacks suppressed [ 168.605181][T17236] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 168.627130][T17239] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 168.638294][T17241] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:53 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xe78ec3bc7}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:53 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:53 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 168.652110][T17248] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 168.662360][T17253] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 168.672139][T17250] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:53 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xfeffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 168.733931][T17265] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 168.750653][T17267] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 168.765883][T17274] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 168.781477][T17273] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:54 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x40000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x2400, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xffffff7f}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:54 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:54 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:54 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:54 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:54 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xffffff9e}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:54 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x3f00, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:55 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:55 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xffffffea}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:55 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xffffffef}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:55 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:55 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:55 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc9100000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xfffffff0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x4000, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x600000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:56 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:56 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:56 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffefffff, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:56 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xfffffffc}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:56 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xfffffffe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x700000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:56 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:56 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:56 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffefff, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x800000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x4102, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:57 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xec3581dec}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:57 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:57 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x900000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xa00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:57 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:57 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:57 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:58 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x5800, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xb00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:58 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffe000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:58 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xc00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:58 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x5c00, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xd00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:58 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xe00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x600000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 173.854978][T17543] EXT4-fs: 68 callbacks suppressed [ 173.854992][T17543] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 173.885877][T17546] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 173.896462][T17545] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:59 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x700000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:59 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:59 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) [ 173.905893][T17558] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 173.916283][T17561] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 173.927167][T17560] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 173.998685][T17574] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 174.009271][T17575] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 174.021047][T17578] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 174.030463][T17580] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 10:09:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x6000, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:09:59 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:59 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x800000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:59 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:59 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:59 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:59 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x900000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:09:59 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:59 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:09:59 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:00 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xa00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x80fe, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:10:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:00 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:00 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:00 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:00 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xb00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:00 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:00 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x2000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:00 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:00 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:00 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x8400, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:10:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xc00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x8000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:01 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:01 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:01 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xd00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:01 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x8500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:01 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:01 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xe00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xb804, 0x20000004, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 10:10:02 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x9effffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:02 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xc73bec780e000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0x1100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:10:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:02 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:02 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x210d2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x302424, &(0x7f0000000840)=ANY=[]) 10:10:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001c80)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@mcast2, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {0xeaffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0)