xq_info_reg+0x18e/0x2f0 [ 529.311544][T20526] ? __rcu_read_lock+0x50/0x50 [ 529.316305][T20526] ? alloc_netdev_mqs+0xa0c/0xc60 [ 529.321311][T20526] ? vti6_locate+0x551/0x910 [ 529.325876][T20526] vti6_locate+0x610/0x910 [ 529.330276][T20526] ? cap_capable+0x23f/0x280 [ 529.334842][T20526] ? vti6_link_config+0x530/0x530 [ 529.339853][T20526] ? vti6_ioctl+0xa64/0x1b10 [ 529.344423][T20526] vti6_ioctl+0xa88/0x1b10 [ 529.348816][T20526] ? vti6_tnl_xmit+0x1720/0x1720 [ 529.353730][T20526] ? __rcu_read_lock+0x50/0x50 [ 529.358470][T20526] ? check_preemption_disabled+0x154/0x330 [ 529.364253][T20526] ? avc_has_extended_perms+0xb5e/0x1140 [ 529.369859][T20526] ? full_name_hash+0xb4/0xe0 [ 529.374513][T20526] dev_ifsioc+0x675/0xa70 [ 529.378818][T20526] ? mutex_lock+0xa6/0x110 [ 529.383225][T20526] ? dev_ioctl+0xab0/0xab0 [ 529.387614][T20526] dev_ioctl+0x558/0xab0 [ 529.391832][T20526] sock_ioctl+0x677/0x760 [ 529.396134][T20526] ? sock_poll+0x2f0/0x2f0 [ 529.400805][T20526] ? memset+0x1f/0x40 [ 529.404758][T20526] ? fsnotify+0x1332/0x13f0 [ 529.409236][T20526] ? sock_poll+0x2f0/0x2f0 [ 529.413627][T20526] do_vfs_ioctl+0x76a/0x1720 [ 529.418192][T20526] ? selinux_file_ioctl+0x72f/0x990 [ 529.423365][T20526] ? ioctl_preallocate+0x250/0x250 [ 529.428458][T20526] ? __fget+0x37b/0x3c0 [ 529.432590][T20526] ? vfs_write+0x422/0x4e0 [ 529.436978][T20526] ? fget_many+0x20/0x20 [ 529.441195][T20526] ? debug_smp_processor_id+0x20/0x20 [ 529.446627][T20526] ? security_file_ioctl+0x9d/0xb0 [ 529.451732][T20526] __x64_sys_ioctl+0xd4/0x110 [ 529.456401][T20526] do_syscall_64+0xcb/0x1e0 [ 529.460895][T20526] entry_SYSCALL_64_after_hwframe+0x44/0xa9 21:32:14 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xba00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 529.466761][T20526] RIP: 0033:0x466459 [ 529.470629][T20526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 529.491340][T20526] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.499723][T20526] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 529.507756][T20526] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x12, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:14 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x3}, @mcast2}}) 21:32:14 executing program 0 (fault-call:8 fault-nth:39): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:14 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xbf01], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:14 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) [ 529.515703][T20526] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 529.523649][T20526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 529.531593][T20526] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 529.568944][T20523] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 529.587038][T20542] x_tables: duplicate underflow at hook 2 [ 529.599319][T20545] FAULT_INJECTION: forcing a failure. [ 529.599319][T20545] name failslab, interval 1, probability 0, space 0, times 0 [ 529.615586][T20545] CPU: 0 PID: 20545 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 529.622651][T20527] EXT4-fs (loop1): Can't read superblock on 2nd try [ 529.625833][T20545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.625838][T20545] Call Trace: [ 529.625865][T20545] dump_stack+0x1d8/0x24e [ 529.650344][T20545] ? devkmsg_release+0x11c/0x11c [ 529.655270][T20545] ? mutex_unlock+0x19/0x40 [ 529.659750][T20545] ? show_regs_print_info+0x12/0x12 [ 529.664922][T20545] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 529.671051][T20545] should_fail+0x6f6/0x860 [ 529.675442][T20545] ? setup_fault_attr+0x3d0/0x3d0 [ 529.680440][T20545] ? _raw_spin_lock+0xa3/0x1b0 [ 529.685200][T20545] ? __kernfs_new_node+0xdb/0x6d0 [ 529.690196][T20545] should_failslab+0x5/0x20 [ 529.694679][T20545] kmem_cache_alloc+0x36/0x290 [ 529.699421][T20545] __kernfs_new_node+0xdb/0x6d0 [ 529.704249][T20545] ? mutex_lock+0xa6/0x110 [ 529.708654][T20545] ? kernfs_new_node+0x160/0x160 [ 529.713568][T20545] ? kernfs_activate+0x3fc/0x420 [ 529.718489][T20545] kernfs_new_node+0x95/0x160 [ 529.723143][T20545] __kernfs_create_file+0x45/0x260 [ 529.728227][T20545] sysfs_add_file_mode_ns+0x293/0x340 [ 529.733574][T20545] internal_create_group+0x560/0xf10 [ 529.738863][T20545] ? sysfs_create_group+0x20/0x20 [ 529.743858][T20545] sysfs_create_groups+0x5d/0x130 [ 529.748860][T20545] device_add+0xa51/0x18a0 [ 529.753359][T20545] ? get_device+0x30/0x30 [ 529.757769][T20545] ? virtual_device_parent+0x50/0x50 [ 529.763046][T20545] ? pm_runtime_init+0x206/0x320 [ 529.767958][T20545] ? device_initialize+0x1d3/0x3e0 [ 529.773051][T20545] netdev_register_kobject+0x178/0x310 [ 529.778506][T20545] ? raw_notifier_call_chain+0xf2/0x110 [ 529.784026][T20545] register_netdevice+0xbc7/0x1480 [ 529.789113][T20545] ? netdev_update_lockdep_key+0x10/0x10 [ 529.794722][T20545] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 529.799720][T20545] ? __rcu_read_lock+0x50/0x50 [ 529.804457][T20545] ? alloc_netdev_mqs+0xa0c/0xc60 [ 529.809476][T20545] ? vti6_locate+0x551/0x910 [ 529.814040][T20545] vti6_locate+0x610/0x910 [ 529.818434][T20545] ? cap_capable+0x23f/0x280 [ 529.822998][T20545] ? vti6_link_config+0x530/0x530 [ 529.827995][T20545] ? vti6_ioctl+0xa64/0x1b10 [ 529.832566][T20545] vti6_ioctl+0xa88/0x1b10 [ 529.836966][T20545] ? vti6_tnl_xmit+0x1720/0x1720 [ 529.841886][T20545] ? __rcu_read_lock+0x50/0x50 [ 529.846847][T20545] ? check_preemption_disabled+0x154/0x330 [ 529.852745][T20545] ? avc_has_extended_perms+0xb5e/0x1140 [ 529.858372][T20545] ? full_name_hash+0xb4/0xe0 [ 529.863025][T20545] dev_ifsioc+0x675/0xa70 [ 529.867336][T20545] ? mutex_lock+0xa6/0x110 [ 529.871747][T20545] ? dev_ioctl+0xab0/0xab0 [ 529.876159][T20545] dev_ioctl+0x558/0xab0 [ 529.880387][T20545] sock_ioctl+0x677/0x760 [ 529.884692][T20545] ? sock_poll+0x2f0/0x2f0 [ 529.889202][T20545] ? memset+0x1f/0x40 [ 529.893168][T20545] ? fsnotify+0x1332/0x13f0 [ 529.897678][T20545] ? sock_poll+0x2f0/0x2f0 [ 529.902072][T20545] do_vfs_ioctl+0x76a/0x1720 [ 529.906652][T20545] ? selinux_file_ioctl+0x72f/0x990 [ 529.911877][T20545] ? ioctl_preallocate+0x250/0x250 [ 529.916967][T20545] ? __fget+0x37b/0x3c0 [ 529.921100][T20545] ? vfs_write+0x422/0x4e0 [ 529.925493][T20545] ? fget_many+0x20/0x20 [ 529.929728][T20545] ? debug_smp_processor_id+0x20/0x20 [ 529.935187][T20545] ? security_file_ioctl+0x9d/0xb0 [ 529.940272][T20545] __x64_sys_ioctl+0xd4/0x110 [ 529.944925][T20545] do_syscall_64+0xcb/0x1e0 [ 529.949416][T20545] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 529.955301][T20545] RIP: 0033:0x466459 21:32:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x25, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:15 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xc005], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:15 executing program 0 (fault-call:8 fault-nth:40): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 529.959178][T20545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 529.978757][T20545] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.987248][T20545] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 529.995217][T20545] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 530.003166][T20545] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 530.011113][T20545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 530.019058][T20545] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 530.057071][T20554] FAULT_INJECTION: forcing a failure. [ 530.057071][T20554] name failslab, interval 1, probability 0, space 0, times 0 [ 530.074637][T20554] CPU: 1 PID: 20554 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 530.075264][T20559] x_tables: duplicate underflow at hook 2 [ 530.085033][T20554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.085037][T20554] Call Trace: [ 530.085061][T20554] dump_stack+0x1d8/0x24e [ 530.085073][T20554] ? devkmsg_release+0x11c/0x11c [ 530.085083][T20554] ? mutex_unlock+0x19/0x40 [ 530.085092][T20554] ? show_regs_print_info+0x12/0x12 [ 530.085112][T20554] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 530.129340][T20554] should_fail+0x6f6/0x860 [ 530.133745][T20554] ? setup_fault_attr+0x3d0/0x3d0 [ 530.138788][T20554] ? _raw_spin_lock+0xa3/0x1b0 [ 530.143531][T20554] ? __kernfs_new_node+0xdb/0x6d0 [ 530.148542][T20554] should_failslab+0x5/0x20 [ 530.153022][T20554] kmem_cache_alloc+0x36/0x290 [ 530.157766][T20554] __kernfs_new_node+0xdb/0x6d0 [ 530.162606][T20554] ? mutex_lock+0xa6/0x110 [ 530.167149][T20554] ? kernfs_new_node+0x160/0x160 [ 530.172077][T20554] ? kernfs_activate+0x3fc/0x420 [ 530.176990][T20554] kernfs_new_node+0x95/0x160 [ 530.181662][T20554] __kernfs_create_file+0x45/0x260 [ 530.186760][T20554] sysfs_add_file_mode_ns+0x293/0x340 [ 530.192186][T20554] internal_create_group+0x560/0xf10 [ 530.197461][T20554] ? sysfs_create_group+0x20/0x20 [ 530.202575][T20554] sysfs_create_groups+0x5d/0x130 [ 530.207575][T20554] device_add+0xa51/0x18a0 [ 530.211967][T20554] ? get_device+0x30/0x30 [ 530.216290][T20554] ? virtual_device_parent+0x50/0x50 [ 530.221546][T20554] ? pm_runtime_init+0x206/0x320 [ 530.226457][T20554] ? device_initialize+0x1d3/0x3e0 [ 530.231541][T20554] netdev_register_kobject+0x178/0x310 [ 530.236993][T20554] ? raw_notifier_call_chain+0xf2/0x110 [ 530.242519][T20554] register_netdevice+0xbc7/0x1480 [ 530.247603][T20554] ? netdev_update_lockdep_key+0x10/0x10 [ 530.253225][T20554] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 530.258228][T20554] ? __rcu_read_lock+0x50/0x50 [ 530.262966][T20554] ? alloc_netdev_mqs+0xa0c/0xc60 [ 530.267968][T20554] ? vti6_locate+0x551/0x910 [ 530.272556][T20554] vti6_locate+0x610/0x910 [ 530.276947][T20554] ? cap_capable+0x23f/0x280 [ 530.281509][T20554] ? vti6_link_config+0x530/0x530 [ 530.286512][T20554] ? vti6_ioctl+0xa64/0x1b10 [ 530.291082][T20554] vti6_ioctl+0xa88/0x1b10 [ 530.295484][T20554] ? vti6_tnl_xmit+0x1720/0x1720 [ 530.300410][T20554] ? __rcu_read_lock+0x50/0x50 [ 530.305275][T20554] ? check_preemption_disabled+0x154/0x330 [ 530.311177][T20554] ? avc_has_extended_perms+0xb5e/0x1140 [ 530.316789][T20554] ? full_name_hash+0xb4/0xe0 [ 530.321445][T20554] dev_ifsioc+0x675/0xa70 [ 530.325753][T20554] ? mutex_lock+0xa6/0x110 [ 530.330162][T20554] ? dev_ioctl+0xab0/0xab0 [ 530.334556][T20554] dev_ioctl+0x558/0xab0 [ 530.338777][T20554] sock_ioctl+0x677/0x760 [ 530.343081][T20554] ? sock_poll+0x2f0/0x2f0 [ 530.347472][T20554] ? memset+0x1f/0x40 [ 530.351427][T20554] ? fsnotify+0x1332/0x13f0 [ 530.355901][T20554] ? sock_poll+0x2f0/0x2f0 [ 530.360292][T20554] do_vfs_ioctl+0x76a/0x1720 [ 530.364858][T20554] ? selinux_file_ioctl+0x72f/0x990 [ 530.370042][T20554] ? ioctl_preallocate+0x250/0x250 [ 530.375140][T20554] ? __fget+0x37b/0x3c0 [ 530.379273][T20554] ? vfs_write+0x422/0x4e0 [ 530.383664][T20554] ? fget_many+0x20/0x20 [ 530.387889][T20554] ? debug_smp_processor_id+0x20/0x20 [ 530.393236][T20554] ? security_file_ioctl+0x9d/0xb0 [ 530.398322][T20554] __x64_sys_ioctl+0xd4/0x110 [ 530.402996][T20554] do_syscall_64+0xcb/0x1e0 [ 530.407485][T20554] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 530.413351][T20554] RIP: 0033:0x466459 21:32:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019004800900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x48, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:15 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xd202], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 530.417235][T20554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 530.436811][T20554] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 530.445199][T20554] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 530.453158][T20554] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 530.461110][T20554] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 21:32:15 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x4}, @mcast2}}) 21:32:15 executing program 0 (fault-call:8 fault-nth:41): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x4c, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:15 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xd602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 530.469103][T20554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 530.477056][T20554] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 530.494744][T20549] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 530.515044][T20563] x_tables: duplicate underflow at hook 2 [ 530.531474][T20565] FAULT_INJECTION: forcing a failure. [ 530.531474][T20565] name failslab, interval 1, probability 0, space 0, times 0 [ 530.544274][T20565] CPU: 1 PID: 20565 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 530.554771][T20565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.564811][T20565] Call Trace: [ 530.568112][T20565] dump_stack+0x1d8/0x24e [ 530.572427][T20565] ? devkmsg_release+0x11c/0x11c [ 530.577358][T20565] ? mutex_unlock+0x19/0x40 [ 530.581840][T20565] ? show_regs_print_info+0x12/0x12 [ 530.587032][T20565] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 530.593073][T20565] should_fail+0x6f6/0x860 [ 530.597467][T20565] ? setup_fault_attr+0x3d0/0x3d0 [ 530.602477][T20565] ? _raw_spin_lock+0xa3/0x1b0 [ 530.607462][T20565] ? __kernfs_new_node+0xdb/0x6d0 [ 530.612474][T20565] should_failslab+0x5/0x20 [ 530.617068][T20565] kmem_cache_alloc+0x36/0x290 [ 530.621821][T20565] __kernfs_new_node+0xdb/0x6d0 [ 530.626659][T20565] ? mutex_lock+0xa6/0x110 [ 530.631053][T20565] ? kernfs_new_node+0x160/0x160 [ 530.635968][T20565] ? kernfs_activate+0x3fc/0x420 [ 530.640882][T20565] kernfs_new_node+0x95/0x160 [ 530.645536][T20565] __kernfs_create_file+0x45/0x260 [ 530.650623][T20565] sysfs_add_file_mode_ns+0x293/0x340 [ 530.655972][T20565] internal_create_group+0x560/0xf10 [ 530.661233][T20565] ? sysfs_create_group+0x20/0x20 [ 530.666232][T20565] sysfs_create_groups+0x5d/0x130 [ 530.671234][T20565] device_add+0xa51/0x18a0 [ 530.675627][T20565] ? get_device+0x30/0x30 [ 530.680005][T20565] ? virtual_device_parent+0x50/0x50 [ 530.685278][T20565] ? pm_runtime_init+0x206/0x320 [ 530.690206][T20565] ? device_initialize+0x1d3/0x3e0 [ 530.695328][T20565] netdev_register_kobject+0x178/0x310 [ 530.700766][T20565] ? raw_notifier_call_chain+0xf2/0x110 [ 530.706293][T20565] register_netdevice+0xbc7/0x1480 [ 530.711381][T20565] ? netdev_update_lockdep_key+0x10/0x10 [ 530.716985][T20565] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 530.721987][T20565] ? __rcu_read_lock+0x50/0x50 [ 530.726727][T20565] ? alloc_netdev_mqs+0xa0c/0xc60 [ 530.731727][T20565] ? vti6_locate+0x551/0x910 [ 530.736299][T20565] vti6_locate+0x610/0x910 [ 530.740711][T20565] ? cap_capable+0x23f/0x280 [ 530.745273][T20565] ? vti6_link_config+0x530/0x530 [ 530.750271][T20565] ? vti6_ioctl+0xa64/0x1b10 [ 530.754836][T20565] vti6_ioctl+0xa88/0x1b10 [ 530.759227][T20565] ? vti6_tnl_xmit+0x1720/0x1720 [ 530.764154][T20565] ? __rcu_read_lock+0x50/0x50 [ 530.768890][T20565] ? check_preemption_disabled+0x154/0x330 [ 530.774699][T20565] ? avc_has_extended_perms+0xb5e/0x1140 [ 530.780302][T20565] ? full_name_hash+0xb4/0xe0 [ 530.784954][T20565] dev_ifsioc+0x675/0xa70 [ 530.789259][T20565] ? mutex_lock+0xa6/0x110 [ 530.793646][T20565] ? dev_ioctl+0xab0/0xab0 [ 530.798033][T20565] dev_ioctl+0x558/0xab0 [ 530.802249][T20565] sock_ioctl+0x677/0x760 [ 530.806551][T20565] ? sock_poll+0x2f0/0x2f0 [ 530.810938][T20565] ? memset+0x1f/0x40 [ 530.814918][T20565] ? fsnotify+0x1332/0x13f0 [ 530.819403][T20565] ? sock_poll+0x2f0/0x2f0 [ 530.823798][T20565] do_vfs_ioctl+0x76a/0x1720 [ 530.828382][T20565] ? selinux_file_ioctl+0x72f/0x990 [ 530.833552][T20565] ? ioctl_preallocate+0x250/0x250 [ 530.838636][T20565] ? __fget+0x37b/0x3c0 [ 530.842765][T20565] ? vfs_write+0x422/0x4e0 [ 530.847169][T20565] ? fget_many+0x20/0x20 [ 530.851385][T20565] ? debug_smp_processor_id+0x20/0x20 [ 530.856729][T20565] ? security_file_ioctl+0x9d/0xb0 [ 530.861815][T20565] __x64_sys_ioctl+0xd4/0x110 [ 530.866466][T20565] do_syscall_64+0xcb/0x1e0 [ 530.870943][T20565] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 530.876831][T20565] RIP: 0033:0x466459 [ 530.880701][T20565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 530.900390][T20565] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 530.908776][T20565] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 530.916722][T20565] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 530.924677][T20565] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 21:32:16 executing program 0 (fault-call:8 fault-nth:42): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:16 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) [ 530.932625][T20565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 530.940575][T20565] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x60, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:16 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xdb00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 530.980769][T20574] x_tables: duplicate underflow at hook 2 [ 530.983979][T20575] FAULT_INJECTION: forcing a failure. [ 530.983979][T20575] name failslab, interval 1, probability 0, space 0, times 0 [ 531.007136][T20575] CPU: 1 PID: 20575 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 531.017403][T20575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.027458][T20575] Call Trace: 21:32:16 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xe401], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 531.030755][T20575] dump_stack+0x1d8/0x24e [ 531.035086][T20575] ? devkmsg_release+0x11c/0x11c [ 531.040028][T20575] ? mutex_unlock+0x19/0x40 [ 531.044539][T20575] ? show_regs_print_info+0x12/0x12 [ 531.049746][T20575] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 531.050815][T20571] EXT4-fs (loop1): Can't read superblock on 2nd try [ 531.055809][T20575] should_fail+0x6f6/0x860 [ 531.055825][T20575] ? setup_fault_attr+0x3d0/0x3d0 [ 531.067275][T20587] x_tables: duplicate underflow at hook 2 [ 531.071819][T20575] ? _raw_spin_lock+0xa3/0x1b0 [ 531.071830][T20575] ? __kernfs_new_node+0xdb/0x6d0 [ 531.071839][T20575] should_failslab+0x5/0x20 [ 531.071848][T20575] kmem_cache_alloc+0x36/0x290 [ 531.071862][T20575] __kernfs_new_node+0xdb/0x6d0 [ 531.101482][T20575] ? mutex_lock+0xa6/0x110 [ 531.105873][T20575] ? kernfs_new_node+0x160/0x160 [ 531.110784][T20575] ? kernfs_activate+0x3fc/0x420 [ 531.115743][T20575] kernfs_new_node+0x95/0x160 [ 531.120397][T20575] __kernfs_create_file+0x45/0x260 [ 531.125479][T20575] sysfs_add_file_mode_ns+0x293/0x340 [ 531.130824][T20575] internal_create_group+0x560/0xf10 [ 531.136080][T20575] ? sysfs_create_group+0x20/0x20 [ 531.141081][T20575] sysfs_create_groups+0x5d/0x130 [ 531.146078][T20575] device_add+0xa51/0x18a0 [ 531.150468][T20575] ? get_device+0x30/0x30 [ 531.154772][T20575] ? virtual_device_parent+0x50/0x50 [ 531.160028][T20575] ? pm_runtime_init+0x206/0x320 [ 531.164938][T20575] ? device_initialize+0x1d3/0x3e0 [ 531.170029][T20575] netdev_register_kobject+0x178/0x310 [ 531.175473][T20575] ? raw_notifier_call_chain+0xf2/0x110 [ 531.181002][T20575] register_netdevice+0xbc7/0x1480 [ 531.186114][T20575] ? netdev_update_lockdep_key+0x10/0x10 [ 531.191724][T20575] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 531.196725][T20575] ? __rcu_read_lock+0x50/0x50 [ 531.201463][T20575] ? alloc_netdev_mqs+0xa0c/0xc60 [ 531.206457][T20575] ? vti6_locate+0x551/0x910 [ 531.211016][T20575] vti6_locate+0x610/0x910 [ 531.215408][T20575] ? cap_capable+0x23f/0x280 [ 531.219975][T20575] ? vti6_link_config+0x530/0x530 [ 531.224978][T20575] ? vti6_ioctl+0xa64/0x1b10 [ 531.229537][T20575] vti6_ioctl+0xa88/0x1b10 [ 531.233926][T20575] ? vti6_tnl_xmit+0x1720/0x1720 [ 531.238838][T20575] ? __rcu_read_lock+0x50/0x50 [ 531.243592][T20575] ? check_preemption_disabled+0x154/0x330 [ 531.249373][T20575] ? avc_has_extended_perms+0xb5e/0x1140 [ 531.254993][T20575] ? full_name_hash+0xb4/0xe0 [ 531.259642][T20575] dev_ifsioc+0x675/0xa70 [ 531.263949][T20575] ? mutex_lock+0xa6/0x110 [ 531.268945][T20575] ? dev_ioctl+0xab0/0xab0 [ 531.273331][T20575] dev_ioctl+0x558/0xab0 [ 531.277547][T20575] sock_ioctl+0x677/0x760 [ 531.281856][T20575] ? sock_poll+0x2f0/0x2f0 [ 531.286246][T20575] ? memset+0x1f/0x40 [ 531.290199][T20575] ? fsnotify+0x1332/0x13f0 [ 531.294673][T20575] ? sock_poll+0x2f0/0x2f0 [ 531.299099][T20575] do_vfs_ioctl+0x76a/0x1720 [ 531.303661][T20575] ? selinux_file_ioctl+0x72f/0x990 [ 531.308852][T20575] ? ioctl_preallocate+0x250/0x250 [ 531.313941][T20575] ? __fget+0x37b/0x3c0 [ 531.318157][T20575] ? vfs_write+0x422/0x4e0 [ 531.322578][T20575] ? fget_many+0x20/0x20 [ 531.326831][T20575] ? debug_smp_processor_id+0x20/0x20 [ 531.332184][T20575] ? security_file_ioctl+0x9d/0xb0 [ 531.337272][T20575] __x64_sys_ioctl+0xd4/0x110 [ 531.341925][T20575] do_syscall_64+0xcb/0x1e0 [ 531.346402][T20575] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 531.352331][T20575] RIP: 0033:0x466459 [ 531.356202][T20575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 531.375783][T20575] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 531.384167][T20575] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 531.392111][T20575] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 531.400054][T20575] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 531.408014][T20575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 531.415959][T20575] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019004c00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x68, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:16 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:16 executing program 0 (fault-call:8 fault-nth:43): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:16 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x6}, @mcast2}}) 21:32:16 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xe803], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 531.487324][T20589] secmark_tg_check: 20 callbacks suppressed [ 531.487327][T20589] xt_SECMARK: invalid mode: 0 [ 531.499195][T20591] xt_SECMARK: invalid mode: 0 [ 531.513183][T20571] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x6c, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:16 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xea03], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 531.588497][T20599] FAULT_INJECTION: forcing a failure. [ 531.588497][T20599] name failslab, interval 1, probability 0, space 0, times 0 [ 531.592531][T20604] x_tables: duplicate underflow at hook 2 [ 531.605027][T20600] EXT4-fs (loop2): invalid first ino: 0 [ 531.609246][T20605] xt_SECMARK: invalid mode: 0 [ 531.612972][T20599] CPU: 0 PID: 20599 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 531.627408][T20599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.631561][T20608] xt_SECMARK: invalid mode: 0 [ 531.637458][T20599] Call Trace: [ 531.637481][T20599] dump_stack+0x1d8/0x24e [ 531.637508][T20599] ? devkmsg_release+0x11c/0x11c [ 531.654696][T20599] ? show_regs_print_info+0x12/0x12 [ 531.659921][T20599] ? mutex_lock+0xa6/0x110 [ 531.664321][T20599] ? mutex_trylock+0xb0/0xb0 [ 531.668890][T20599] ? idr_get_free+0x740/0x900 [ 531.673667][T20599] should_fail+0x6f6/0x860 [ 531.678064][T20599] ? setup_fault_attr+0x3d0/0x3d0 [ 531.683074][T20599] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 531.689123][T20599] ? __kernfs_new_node+0xdb/0x6d0 [ 531.694129][T20599] should_failslab+0x5/0x20 [ 531.698613][T20599] kmem_cache_alloc+0x36/0x290 [ 531.703584][T20599] __kernfs_new_node+0xdb/0x6d0 [ 531.708416][T20599] ? kernfs_new_node+0x160/0x160 [ 531.713358][T20599] ? security_kernfs_init_security+0x9a/0xb0 [ 531.719410][T20599] ? mutex_lock+0xa6/0x110 [ 531.723806][T20599] ? mutex_trylock+0xb0/0xb0 [ 531.728375][T20599] kernfs_new_node+0x95/0x160 [ 531.733033][T20599] __kernfs_create_file+0x45/0x260 [ 531.738119][T20599] sysfs_add_file_mode_ns+0x293/0x340 [ 531.743473][T20599] internal_create_group+0x560/0xf10 [ 531.748750][T20599] ? sysfs_create_group+0x20/0x20 [ 531.753758][T20599] sysfs_create_groups+0x5d/0x130 [ 531.758767][T20599] device_add+0xae5/0x18a0 [ 531.763295][T20599] ? get_device+0x30/0x30 [ 531.767627][T20599] ? virtual_device_parent+0x50/0x50 [ 531.772894][T20599] ? pm_runtime_init+0x206/0x320 [ 531.777809][T20599] ? device_initialize+0x1d3/0x3e0 [ 531.782898][T20599] netdev_register_kobject+0x178/0x310 [ 531.788336][T20599] ? raw_notifier_call_chain+0xf2/0x110 [ 531.793866][T20599] register_netdevice+0xbc7/0x1480 [ 531.798954][T20599] ? netdev_update_lockdep_key+0x10/0x10 [ 531.804569][T20599] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 531.809571][T20599] ? __rcu_read_lock+0x50/0x50 [ 531.814316][T20599] ? alloc_netdev_mqs+0xa0c/0xc60 [ 531.819330][T20599] ? vti6_locate+0x551/0x910 [ 531.823893][T20599] vti6_locate+0x610/0x910 [ 531.828285][T20599] ? cap_capable+0x23f/0x280 [ 531.832848][T20599] ? vti6_link_config+0x530/0x530 [ 531.837844][T20599] ? vti6_ioctl+0xa64/0x1b10 [ 531.842413][T20599] vti6_ioctl+0xa88/0x1b10 [ 531.846805][T20599] ? vti6_tnl_xmit+0x1720/0x1720 [ 531.851718][T20599] ? __rcu_read_lock+0x50/0x50 [ 531.856456][T20599] ? check_preemption_disabled+0x154/0x330 [ 531.862249][T20599] ? avc_has_extended_perms+0xb5e/0x1140 [ 531.867866][T20599] ? full_name_hash+0xb4/0xe0 [ 531.872516][T20599] dev_ifsioc+0x675/0xa70 [ 531.876837][T20599] ? mutex_lock+0xa6/0x110 [ 531.881241][T20599] ? dev_ioctl+0xab0/0xab0 [ 531.885632][T20599] dev_ioctl+0x558/0xab0 [ 531.889958][T20599] sock_ioctl+0x677/0x760 [ 531.894304][T20599] ? sock_poll+0x2f0/0x2f0 [ 531.898703][T20599] ? memset+0x1f/0x40 [ 531.902772][T20599] ? fsnotify+0x1332/0x13f0 [ 531.907366][T20599] ? sock_poll+0x2f0/0x2f0 [ 531.911765][T20599] do_vfs_ioctl+0x76a/0x1720 [ 531.916336][T20599] ? selinux_file_ioctl+0x72f/0x990 [ 531.921513][T20599] ? ioctl_preallocate+0x250/0x250 [ 531.926648][T20599] ? __fget+0x37b/0x3c0 [ 531.930810][T20599] ? vfs_write+0x422/0x4e0 [ 531.935224][T20599] ? fget_many+0x20/0x20 [ 531.939443][T20599] ? debug_smp_processor_id+0x20/0x20 [ 531.944792][T20599] ? security_file_ioctl+0x9d/0xb0 [ 531.949878][T20599] __x64_sys_ioctl+0xd4/0x110 [ 531.954690][T20599] do_syscall_64+0xcb/0x1e0 [ 531.959265][T20599] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 531.965172][T20599] RIP: 0033:0x466459 [ 531.969061][T20599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 21:32:17 executing program 0 (fault-call:8 fault-nth:44): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x74, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:17 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x8}, @mcast2}}) [ 531.988642][T20599] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 531.997036][T20599] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 532.005067][T20599] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 532.013026][T20599] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 532.020978][T20599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 532.028943][T20599] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 532.063348][T20607] EXT4-fs (loop1): Can't read superblock on 2nd try [ 532.073931][T20616] xt_SECMARK: invalid mode: 0 [ 532.085091][T20618] xt_SECMARK: invalid mode: 0 [ 532.094963][T20619] FAULT_INJECTION: forcing a failure. [ 532.094963][T20619] name failslab, interval 1, probability 0, space 0, times 0 [ 532.108648][T20619] CPU: 1 PID: 20619 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 532.118987][T20619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.129024][T20619] Call Trace: [ 532.132301][T20619] dump_stack+0x1d8/0x24e [ 532.136677][T20619] ? devkmsg_release+0x11c/0x11c [ 532.141588][T20619] ? mutex_unlock+0x19/0x40 [ 532.146139][T20619] ? show_regs_print_info+0x12/0x12 [ 532.151313][T20619] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 532.157378][T20619] should_fail+0x6f6/0x860 [ 532.161769][T20619] ? setup_fault_attr+0x3d0/0x3d0 [ 532.166769][T20619] ? _raw_spin_lock+0xa3/0x1b0 [ 532.171511][T20619] ? __kernfs_new_node+0xdb/0x6d0 [ 532.176513][T20619] should_failslab+0x5/0x20 [ 532.180990][T20619] kmem_cache_alloc+0x36/0x290 [ 532.185745][T20619] __kernfs_new_node+0xdb/0x6d0 [ 532.190578][T20619] ? mutex_lock+0xa6/0x110 [ 532.194967][T20619] ? kernfs_new_node+0x160/0x160 [ 532.199877][T20619] ? security_kernfs_init_security+0x9a/0xb0 [ 532.205835][T20619] ? kernfs_activate+0x3fc/0x420 [ 532.210746][T20619] kernfs_new_node+0x95/0x160 [ 532.215409][T20619] __kernfs_create_file+0x45/0x260 [ 532.220494][T20619] sysfs_add_file_mode_ns+0x293/0x340 [ 532.225853][T20619] internal_create_group+0x560/0xf10 [ 532.231111][T20619] ? sysfs_create_group+0x20/0x20 [ 532.236106][T20619] sysfs_create_groups+0x5d/0x130 [ 532.241108][T20619] device_add+0xae5/0x18a0 [ 532.245497][T20619] ? get_device+0x30/0x30 [ 532.249798][T20619] ? virtual_device_parent+0x50/0x50 [ 532.255052][T20619] ? pm_runtime_init+0x206/0x320 [ 532.259976][T20619] ? device_initialize+0x1d3/0x3e0 [ 532.265081][T20619] netdev_register_kobject+0x178/0x310 [ 532.270524][T20619] ? raw_notifier_call_chain+0xf2/0x110 [ 532.276048][T20619] register_netdevice+0xbc7/0x1480 [ 532.281133][T20619] ? netdev_update_lockdep_key+0x10/0x10 [ 532.286755][T20619] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 532.291754][T20619] ? __rcu_read_lock+0x50/0x50 [ 532.296575][T20619] ? alloc_netdev_mqs+0xa0c/0xc60 [ 532.301569][T20619] ? vti6_locate+0x551/0x910 [ 532.306130][T20619] vti6_locate+0x610/0x910 [ 532.310521][T20619] ? cap_capable+0x23f/0x280 [ 532.315086][T20619] ? vti6_link_config+0x530/0x530 [ 532.320081][T20619] ? vti6_ioctl+0xa64/0x1b10 [ 532.324643][T20619] vti6_ioctl+0xa88/0x1b10 [ 532.329032][T20619] ? vti6_tnl_xmit+0x1720/0x1720 [ 532.333942][T20619] ? __rcu_read_lock+0x50/0x50 [ 532.338678][T20619] ? check_preemption_disabled+0x154/0x330 [ 532.344475][T20619] ? avc_has_extended_perms+0xb5e/0x1140 [ 532.350078][T20619] ? full_name_hash+0xb4/0xe0 [ 532.354745][T20619] dev_ifsioc+0x675/0xa70 [ 532.359050][T20619] ? mutex_lock+0xa6/0x110 [ 532.363435][T20619] ? dev_ioctl+0xab0/0xab0 [ 532.367835][T20619] dev_ioctl+0x558/0xab0 [ 532.372071][T20619] sock_ioctl+0x677/0x760 [ 532.376378][T20619] ? sock_poll+0x2f0/0x2f0 [ 532.380769][T20619] ? memset+0x1f/0x40 [ 532.384721][T20619] ? fsnotify+0x1332/0x13f0 [ 532.389208][T20619] ? sock_poll+0x2f0/0x2f0 [ 532.393596][T20619] do_vfs_ioctl+0x76a/0x1720 [ 532.398161][T20619] ? selinux_file_ioctl+0x72f/0x990 [ 532.403343][T20619] ? ioctl_preallocate+0x250/0x250 [ 532.408444][T20619] ? __fget+0x37b/0x3c0 [ 532.412571][T20619] ? vfs_write+0x422/0x4e0 [ 532.416973][T20619] ? fget_many+0x20/0x20 [ 532.421196][T20619] ? debug_smp_processor_id+0x20/0x20 [ 532.426542][T20619] ? security_file_ioctl+0x9d/0xb0 [ 532.431628][T20619] __x64_sys_ioctl+0xd4/0x110 [ 532.436278][T20619] do_syscall_64+0xcb/0x1e0 [ 532.440769][T20619] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 532.446637][T20619] RIP: 0033:0x466459 [ 532.450504][T20619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 532.470085][T20619] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 532.478492][T20619] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 532.486442][T20619] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 532.494389][T20619] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 532.502352][T20619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 21:32:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:17 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:17 executing program 0 (fault-call:8 fault-nth:45): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) [ 532.510297][T20619] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x7a, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:17 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf801], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 532.544637][T20625] EXT4-fs (loop2): invalid first ino: 0 [ 532.575463][T20630] xt_SECMARK: invalid mode: 0 [ 532.578666][T20631] FAULT_INJECTION: forcing a failure. [ 532.578666][T20631] name failslab, interval 1, probability 0, space 0, times 0 21:32:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 532.583721][T20632] xt_SECMARK: invalid mode: 0 [ 532.594163][T20631] CPU: 0 PID: 20631 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 532.607980][T20631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.618043][T20631] Call Trace: [ 532.621337][T20631] dump_stack+0x1d8/0x24e [ 532.625672][T20631] ? devkmsg_release+0x11c/0x11c [ 532.630608][T20631] ? mutex_unlock+0x19/0x40 [ 532.635117][T20631] ? show_regs_print_info+0x12/0x12 21:32:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x2], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 532.640319][T20631] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 532.642569][T20637] xt_SECMARK: invalid mode: 0 [ 532.646382][T20631] should_fail+0x6f6/0x860 [ 532.646392][T20631] ? setup_fault_attr+0x3d0/0x3d0 [ 532.646409][T20631] ? _raw_spin_lock+0xa3/0x1b0 [ 532.651659][T20638] xt_check_table_hooks: 2 callbacks suppressed [ 532.651665][T20638] x_tables: duplicate underflow at hook 2 [ 532.655457][T20631] ? __kernfs_new_node+0xdb/0x6d0 [ 532.655467][T20631] should_failslab+0x5/0x20 [ 532.655483][T20631] kmem_cache_alloc+0x36/0x290 [ 532.680631][T20641] x_tables: duplicate underflow at hook 2 [ 532.682094][T20631] __kernfs_new_node+0xdb/0x6d0 [ 532.682106][T20631] ? mutex_lock+0xa6/0x110 [ 532.682120][T20631] ? kernfs_new_node+0x160/0x160 [ 532.713878][T20646] x_tables: duplicate underflow at hook 2 [ 532.716205][T20631] ? security_kernfs_init_security+0x9a/0xb0 [ 532.716218][T20631] ? kernfs_activate+0x3fc/0x420 [ 532.716233][T20631] kernfs_new_node+0x95/0x160 [ 532.737455][T20631] __kernfs_create_file+0x45/0x260 [ 532.742553][T20631] sysfs_add_file_mode_ns+0x293/0x340 [ 532.747898][T20631] internal_create_group+0x560/0xf10 [ 532.753160][T20631] ? sysfs_create_group+0x20/0x20 [ 532.758154][T20631] sysfs_create_groups+0x5d/0x130 [ 532.763153][T20631] device_add+0xae5/0x18a0 [ 532.767553][T20631] ? get_device+0x30/0x30 [ 532.771853][T20631] ? virtual_device_parent+0x50/0x50 [ 532.777117][T20631] ? pm_runtime_init+0x206/0x320 [ 532.782036][T20631] ? device_initialize+0x1d3/0x3e0 [ 532.787991][T20631] netdev_register_kobject+0x178/0x310 [ 532.793423][T20631] ? raw_notifier_call_chain+0xf2/0x110 [ 532.798942][T20631] register_netdevice+0xbc7/0x1480 [ 532.804025][T20631] ? netdev_update_lockdep_key+0x10/0x10 [ 532.809626][T20631] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 532.814633][T20631] ? __rcu_read_lock+0x50/0x50 [ 532.819366][T20631] ? alloc_netdev_mqs+0xa0c/0xc60 [ 532.824446][T20631] ? vti6_locate+0x551/0x910 [ 532.829007][T20631] vti6_locate+0x610/0x910 [ 532.833396][T20631] ? cap_capable+0x23f/0x280 [ 532.837979][T20631] ? vti6_link_config+0x530/0x530 [ 532.842987][T20631] ? vti6_ioctl+0xa64/0x1b10 [ 532.847547][T20631] vti6_ioctl+0xa88/0x1b10 [ 532.851936][T20631] ? vti6_tnl_xmit+0x1720/0x1720 [ 532.856850][T20631] ? __rcu_read_lock+0x50/0x50 [ 532.861587][T20631] ? check_preemption_disabled+0x154/0x330 [ 532.867393][T20631] ? avc_has_extended_perms+0xb5e/0x1140 [ 532.872998][T20631] ? full_name_hash+0xb4/0xe0 [ 532.877649][T20631] dev_ifsioc+0x675/0xa70 [ 532.881950][T20631] ? mutex_lock+0xa6/0x110 [ 532.886437][T20631] ? dev_ioctl+0xab0/0xab0 [ 532.890844][T20631] dev_ioctl+0x558/0xab0 [ 532.895065][T20631] sock_ioctl+0x677/0x760 [ 532.899365][T20631] ? sock_poll+0x2f0/0x2f0 [ 532.903753][T20631] ? memset+0x1f/0x40 [ 532.907707][T20631] ? fsnotify+0x1332/0x13f0 [ 532.912180][T20631] ? sock_poll+0x2f0/0x2f0 [ 532.916569][T20631] do_vfs_ioctl+0x76a/0x1720 [ 532.921146][T20631] ? selinux_file_ioctl+0x72f/0x990 [ 532.926340][T20631] ? ioctl_preallocate+0x250/0x250 [ 532.931450][T20631] ? __fget+0x37b/0x3c0 [ 532.935578][T20631] ? vfs_write+0x422/0x4e0 [ 532.939965][T20631] ? fget_many+0x20/0x20 [ 532.944265][T20631] ? debug_smp_processor_id+0x20/0x20 [ 532.949607][T20631] ? security_file_ioctl+0x9d/0xb0 [ 532.954692][T20631] __x64_sys_ioctl+0xd4/0x110 [ 532.959343][T20631] do_syscall_64+0xcb/0x1e0 [ 532.963820][T20631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 532.969685][T20631] RIP: 0033:0x466459 [ 532.973552][T20631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 21:32:18 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf803], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) [ 532.993128][T20631] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 533.001509][T20631] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 533.009452][T20631] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 533.017398][T20631] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 533.026475][T20631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 533.034419][T20631] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:18 executing program 0 (fault-call:8 fault-nth:46): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:18 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0xa}, @mcast2}}) [ 533.050291][T20648] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 533.092089][T20653] xt_SECMARK: invalid mode: 0 [ 533.095759][T20645] EXT4-fs (loop1): Can't read superblock on 2nd try [ 533.117470][T20657] FAULT_INJECTION: forcing a failure. [ 533.117470][T20657] name failslab, interval 1, probability 0, space 0, times 0 [ 533.120884][T20654] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 533.145179][T20657] CPU: 1 PID: 20657 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 533.155508][T20657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.165594][T20657] Call Trace: [ 533.168866][T20657] dump_stack+0x1d8/0x24e [ 533.173222][T20657] ? devkmsg_release+0x11c/0x11c [ 533.178148][T20657] ? mutex_unlock+0x19/0x40 [ 533.182644][T20657] ? show_regs_print_info+0x12/0x12 [ 533.187817][T20657] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 533.193855][T20657] should_fail+0x6f6/0x860 [ 533.198263][T20657] ? setup_fault_attr+0x3d0/0x3d0 [ 533.203260][T20657] ? _raw_spin_lock+0xa3/0x1b0 [ 533.208002][T20657] ? __kernfs_new_node+0xdb/0x6d0 [ 533.213004][T20657] should_failslab+0x5/0x20 [ 533.217498][T20657] kmem_cache_alloc+0x36/0x290 [ 533.222264][T20657] __kernfs_new_node+0xdb/0x6d0 [ 533.227087][T20657] ? mutex_lock+0xa6/0x110 [ 533.231489][T20657] ? kernfs_new_node+0x160/0x160 [ 533.236439][T20657] ? security_kernfs_init_security+0x9a/0xb0 [ 533.242410][T20657] ? kernfs_activate+0x3fc/0x420 [ 533.247331][T20657] kernfs_new_node+0x95/0x160 [ 533.252069][T20657] __kernfs_create_file+0x45/0x260 [ 533.257171][T20657] sysfs_add_file_mode_ns+0x293/0x340 [ 533.262523][T20657] internal_create_group+0x560/0xf10 [ 533.267799][T20657] ? sysfs_create_group+0x20/0x20 [ 533.272795][T20657] sysfs_create_groups+0x5d/0x130 [ 533.277815][T20657] device_add+0xae5/0x18a0 [ 533.282203][T20657] ? get_device+0x30/0x30 [ 533.286517][T20657] ? virtual_device_parent+0x50/0x50 [ 533.291780][T20657] ? pm_runtime_init+0x206/0x320 [ 533.296791][T20657] ? device_initialize+0x1d3/0x3e0 [ 533.301893][T20657] netdev_register_kobject+0x178/0x310 [ 533.307340][T20657] ? raw_notifier_call_chain+0xf2/0x110 [ 533.312859][T20657] register_netdevice+0xbc7/0x1480 [ 533.318053][T20657] ? netdev_update_lockdep_key+0x10/0x10 [ 533.323682][T20657] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 533.328700][T20657] ? __rcu_read_lock+0x50/0x50 [ 533.333443][T20657] ? alloc_netdev_mqs+0xa0c/0xc60 [ 533.338456][T20657] ? vti6_locate+0x551/0x910 [ 533.343037][T20657] vti6_locate+0x610/0x910 [ 533.347429][T20657] ? cap_capable+0x23f/0x280 [ 533.351997][T20657] ? vti6_link_config+0x530/0x530 [ 533.357013][T20657] ? vti6_ioctl+0xa64/0x1b10 [ 533.361594][T20657] vti6_ioctl+0xa88/0x1b10 [ 533.366014][T20657] ? vti6_tnl_xmit+0x1720/0x1720 [ 533.370927][T20657] ? __rcu_read_lock+0x50/0x50 [ 533.375663][T20657] ? check_preemption_disabled+0x154/0x330 [ 533.381443][T20657] ? avc_has_extended_perms+0xb5e/0x1140 [ 533.387052][T20657] ? full_name_hash+0xb4/0xe0 [ 533.391703][T20657] dev_ifsioc+0x675/0xa70 [ 533.396006][T20657] ? mutex_lock+0xa6/0x110 [ 533.400395][T20657] ? dev_ioctl+0xab0/0xab0 [ 533.404784][T20657] dev_ioctl+0x558/0xab0 [ 533.408999][T20657] sock_ioctl+0x677/0x760 [ 533.413302][T20657] ? sock_poll+0x2f0/0x2f0 [ 533.417694][T20657] ? memset+0x1f/0x40 [ 533.421646][T20657] ? fsnotify+0x1332/0x13f0 [ 533.426127][T20657] ? sock_poll+0x2f0/0x2f0 [ 533.430542][T20657] do_vfs_ioctl+0x76a/0x1720 [ 533.435112][T20657] ? selinux_file_ioctl+0x72f/0x990 [ 533.440284][T20657] ? ioctl_preallocate+0x250/0x250 [ 533.445371][T20657] ? __fget+0x37b/0x3c0 [ 533.449501][T20657] ? vfs_write+0x422/0x4e0 [ 533.453892][T20657] ? fget_many+0x20/0x20 [ 533.458114][T20657] ? debug_smp_processor_id+0x20/0x20 [ 533.463460][T20657] ? security_file_ioctl+0x9d/0xb0 [ 533.468570][T20657] __x64_sys_ioctl+0xd4/0x110 [ 533.473232][T20657] do_syscall_64+0xcb/0x1e0 [ 533.477730][T20657] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 533.483598][T20657] RIP: 0033:0x466459 [ 533.487474][T20657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 533.507048][T20657] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 533.515458][T20657] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 533.523403][T20657] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 533.531352][T20657] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 533.539303][T20657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 533.547256][T20657] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006800900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x3], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:18 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfb06], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:18 executing program 0 (fault-call:8 fault-nth:47): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:18 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x10}, @mcast2}}) 21:32:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) [ 533.608684][T20661] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:18 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfc06], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 533.686367][T20672] x_tables: duplicate underflow at hook 2 [ 533.694941][T20675] FAULT_INJECTION: forcing a failure. [ 533.694941][T20675] name failslab, interval 1, probability 0, space 0, times 0 [ 533.708977][T20675] CPU: 0 PID: 20675 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 533.719371][T20675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.729411][T20675] Call Trace: [ 533.732688][T20675] dump_stack+0x1d8/0x24e [ 533.737004][T20675] ? devkmsg_release+0x11c/0x11c [ 533.741923][T20675] ? mutex_unlock+0x19/0x40 [ 533.746415][T20675] ? show_regs_print_info+0x12/0x12 [ 533.751589][T20675] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 533.757652][T20675] should_fail+0x6f6/0x860 [ 533.762044][T20675] ? setup_fault_attr+0x3d0/0x3d0 [ 533.767054][T20675] ? _raw_spin_lock+0xa3/0x1b0 [ 533.771816][T20675] ? __kernfs_new_node+0xdb/0x6d0 [ 533.776817][T20675] should_failslab+0x5/0x20 [ 533.781313][T20675] kmem_cache_alloc+0x36/0x290 [ 533.786051][T20675] __kernfs_new_node+0xdb/0x6d0 [ 533.790880][T20675] ? mutex_lock+0xa6/0x110 [ 533.795278][T20675] ? kernfs_new_node+0x160/0x160 [ 533.800214][T20675] ? security_kernfs_init_security+0x9a/0xb0 [ 533.806176][T20675] ? kernfs_activate+0x3fc/0x420 [ 533.811090][T20675] kernfs_new_node+0x95/0x160 [ 533.815743][T20675] __kernfs_create_file+0x45/0x260 [ 533.820827][T20675] sysfs_add_file_mode_ns+0x293/0x340 [ 533.826194][T20675] internal_create_group+0x560/0xf10 [ 533.831466][T20675] ? sysfs_create_group+0x20/0x20 [ 533.836474][T20675] sysfs_create_groups+0x5d/0x130 [ 533.841482][T20675] device_add+0xae5/0x18a0 [ 533.845875][T20675] ? get_device+0x30/0x30 [ 533.850178][T20675] ? virtual_device_parent+0x50/0x50 [ 533.855439][T20675] ? pm_runtime_init+0x206/0x320 [ 533.860351][T20675] ? device_initialize+0x1d3/0x3e0 [ 533.865437][T20675] netdev_register_kobject+0x178/0x310 [ 533.872176][T20675] ? raw_notifier_call_chain+0xf2/0x110 [ 533.877697][T20675] register_netdevice+0xbc7/0x1480 [ 533.882786][T20675] ? netdev_update_lockdep_key+0x10/0x10 [ 533.888392][T20675] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 533.893396][T20675] ? __rcu_read_lock+0x50/0x50 [ 533.898131][T20675] ? alloc_netdev_mqs+0xa0c/0xc60 [ 533.903147][T20675] ? vti6_locate+0x551/0x910 [ 533.907708][T20675] vti6_locate+0x610/0x910 [ 533.912125][T20675] ? cap_capable+0x23f/0x280 [ 533.916691][T20675] ? vti6_link_config+0x530/0x530 [ 533.921687][T20675] ? vti6_ioctl+0xa64/0x1b10 [ 533.926268][T20675] vti6_ioctl+0xa88/0x1b10 [ 533.930754][T20675] ? vti6_tnl_xmit+0x1720/0x1720 [ 533.935681][T20675] ? __rcu_read_lock+0x50/0x50 [ 533.940417][T20675] ? check_preemption_disabled+0x154/0x330 [ 533.946228][T20675] ? avc_has_extended_perms+0xb5e/0x1140 [ 533.951982][T20675] ? full_name_hash+0xb4/0xe0 [ 533.956641][T20675] dev_ifsioc+0x675/0xa70 [ 533.961023][T20675] ? mutex_lock+0xa6/0x110 [ 533.965418][T20675] ? dev_ioctl+0xab0/0xab0 [ 533.969821][T20675] dev_ioctl+0x558/0xab0 [ 533.974040][T20675] sock_ioctl+0x677/0x760 [ 533.978355][T20675] ? sock_poll+0x2f0/0x2f0 [ 533.982761][T20675] ? memset+0x1f/0x40 [ 533.986843][T20675] ? fsnotify+0x1332/0x13f0 [ 533.991332][T20675] ? sock_poll+0x2f0/0x2f0 [ 533.995883][T20675] do_vfs_ioctl+0x76a/0x1720 [ 534.000546][T20675] ? selinux_file_ioctl+0x72f/0x990 [ 534.005730][T20675] ? ioctl_preallocate+0x250/0x250 [ 534.010822][T20675] ? __fget+0x37b/0x3c0 [ 534.014971][T20675] ? vfs_write+0x422/0x4e0 [ 534.019384][T20675] ? fget_many+0x20/0x20 [ 534.023602][T20675] ? debug_smp_processor_id+0x20/0x20 [ 534.028953][T20675] ? security_file_ioctl+0x9d/0xb0 [ 534.034052][T20675] __x64_sys_ioctl+0xd4/0x110 [ 534.038712][T20675] do_syscall_64+0xcb/0x1e0 [ 534.043202][T20675] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 534.049078][T20675] RIP: 0033:0x466459 [ 534.053089][T20675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 534.072908][T20675] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:32:19 executing program 0 (fault-call:8 fault-nth:48): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 534.081300][T20675] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 534.089257][T20675] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 534.097206][T20675] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 534.105165][T20675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 534.113130][T20675] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 534.140977][T20681] FAULT_INJECTION: forcing a failure. [ 534.140977][T20681] name failslab, interval 1, probability 0, space 0, times 0 [ 534.154784][T20681] CPU: 0 PID: 20681 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 534.165037][T20681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.175081][T20681] Call Trace: [ 534.178368][T20681] dump_stack+0x1d8/0x24e [ 534.182683][T20681] ? devkmsg_release+0x11c/0x11c [ 534.187598][T20681] ? mutex_unlock+0x19/0x40 [ 534.192076][T20681] ? show_regs_print_info+0x12/0x12 [ 534.197251][T20681] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 534.203318][T20681] should_fail+0x6f6/0x860 [ 534.207707][T20681] ? setup_fault_attr+0x3d0/0x3d0 [ 534.212703][T20681] ? _raw_spin_lock+0xa3/0x1b0 [ 534.217441][T20681] ? __kernfs_new_node+0xdb/0x6d0 [ 534.222439][T20681] should_failslab+0x5/0x20 [ 534.226920][T20681] kmem_cache_alloc+0x36/0x290 [ 534.231661][T20681] __kernfs_new_node+0xdb/0x6d0 [ 534.236485][T20681] ? mutex_lock+0xa6/0x110 [ 534.240891][T20681] ? kernfs_new_node+0x160/0x160 [ 534.245819][T20681] ? security_kernfs_init_security+0x9a/0xb0 [ 534.251774][T20681] ? kernfs_activate+0x3fc/0x420 [ 534.256692][T20681] kernfs_new_node+0x95/0x160 [ 534.261343][T20681] __kernfs_create_file+0x45/0x260 [ 534.266431][T20681] sysfs_add_file_mode_ns+0x293/0x340 [ 534.271778][T20681] internal_create_group+0x560/0xf10 [ 534.277037][T20681] ? sysfs_create_group+0x20/0x20 [ 534.282035][T20681] sysfs_create_groups+0x5d/0x130 [ 534.287035][T20681] device_add+0xae5/0x18a0 [ 534.291440][T20681] ? get_device+0x30/0x30 [ 534.295744][T20681] ? virtual_device_parent+0x50/0x50 [ 534.301001][T20681] ? pm_runtime_init+0x206/0x320 [ 534.305926][T20681] ? device_initialize+0x1d3/0x3e0 [ 534.311013][T20681] netdev_register_kobject+0x178/0x310 [ 534.316447][T20681] ? raw_notifier_call_chain+0xf2/0x110 [ 534.321968][T20681] register_netdevice+0xbc7/0x1480 [ 534.327055][T20681] ? netdev_update_lockdep_key+0x10/0x10 [ 534.332664][T20681] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 534.337687][T20681] ? __rcu_read_lock+0x50/0x50 [ 534.344082][T20681] ? alloc_netdev_mqs+0xa0c/0xc60 [ 534.349083][T20681] ? vti6_locate+0x551/0x910 [ 534.353663][T20681] vti6_locate+0x610/0x910 [ 534.358056][T20681] ? cap_capable+0x23f/0x280 [ 534.362620][T20681] ? vti6_link_config+0x530/0x530 [ 534.367617][T20681] ? vti6_ioctl+0xa64/0x1b10 [ 534.372274][T20681] vti6_ioctl+0xa88/0x1b10 [ 534.376668][T20681] ? vti6_tnl_xmit+0x1720/0x1720 [ 534.381578][T20681] ? __rcu_read_lock+0x50/0x50 [ 534.386318][T20681] ? check_preemption_disabled+0x154/0x330 [ 534.392099][T20681] ? avc_has_extended_perms+0xb5e/0x1140 [ 534.397704][T20681] ? full_name_hash+0xb4/0xe0 [ 534.402354][T20681] dev_ifsioc+0x675/0xa70 [ 534.406658][T20681] ? mutex_lock+0xa6/0x110 [ 534.411048][T20681] ? dev_ioctl+0xab0/0xab0 [ 534.415436][T20681] dev_ioctl+0x558/0xab0 [ 534.419650][T20681] sock_ioctl+0x677/0x760 [ 534.423949][T20681] ? sock_poll+0x2f0/0x2f0 [ 534.428340][T20681] ? memset+0x1f/0x40 [ 534.432296][T20681] ? fsnotify+0x1332/0x13f0 [ 534.436770][T20681] ? sock_poll+0x2f0/0x2f0 [ 534.441160][T20681] do_vfs_ioctl+0x76a/0x1720 [ 534.446792][T20681] ? selinux_file_ioctl+0x72f/0x990 [ 534.451981][T20681] ? ioctl_preallocate+0x250/0x250 [ 534.457066][T20681] ? __fget+0x37b/0x3c0 [ 534.461195][T20681] ? vfs_write+0x422/0x4e0 [ 534.465584][T20681] ? fget_many+0x20/0x20 [ 534.469802][T20681] ? debug_smp_processor_id+0x20/0x20 [ 534.475181][T20681] ? security_file_ioctl+0x9d/0xb0 [ 534.480265][T20681] __x64_sys_ioctl+0xd4/0x110 [ 534.484919][T20681] do_syscall_64+0xcb/0x1e0 [ 534.489395][T20681] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 534.495262][T20681] RIP: 0033:0x466459 [ 534.499132][T20681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 534.518707][T20681] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 534.527090][T20681] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 534.535036][T20681] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x5], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 534.542983][T20681] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 534.550927][T20681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 534.558887][T20681] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:19 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x14}, @mcast2}}) 21:32:19 executing program 0 (fault-call:8 fault-nth:49): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 534.588673][T20686] x_tables: duplicate underflow at hook 2 [ 534.601194][T20677] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 534.622073][T20689] EXT4-fs (loop1): Can't read superblock on 2nd try [ 534.632897][T20695] x_tables: duplicate underflow at hook 2 [ 534.647248][T20698] FAULT_INJECTION: forcing a failure. [ 534.647248][T20698] name failslab, interval 1, probability 0, space 0, times 0 [ 534.662125][T20698] CPU: 0 PID: 20698 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 534.672374][T20698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.682416][T20698] Call Trace: [ 534.685690][T20698] dump_stack+0x1d8/0x24e [ 534.690004][T20698] ? devkmsg_release+0x11c/0x11c [ 534.694921][T20698] ? mutex_unlock+0x19/0x40 [ 534.699403][T20698] ? show_regs_print_info+0x12/0x12 [ 534.704577][T20698] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 534.710632][T20698] should_fail+0x6f6/0x860 [ 534.715022][T20698] ? setup_fault_attr+0x3d0/0x3d0 [ 534.720026][T20698] ? _raw_spin_lock+0xa3/0x1b0 [ 534.724763][T20698] ? __kernfs_new_node+0xdb/0x6d0 [ 534.729761][T20698] should_failslab+0x5/0x20 [ 534.734240][T20698] kmem_cache_alloc+0x36/0x290 [ 534.738989][T20698] __kernfs_new_node+0xdb/0x6d0 [ 534.743819][T20698] ? mutex_lock+0xa6/0x110 [ 534.748227][T20698] ? kernfs_new_node+0x160/0x160 [ 534.753142][T20698] ? security_kernfs_init_security+0x9a/0xb0 [ 534.759115][T20698] ? kernfs_activate+0x3fc/0x420 [ 534.764043][T20698] kernfs_new_node+0x95/0x160 [ 534.768705][T20698] __kernfs_create_file+0x45/0x260 [ 534.773802][T20698] sysfs_add_file_mode_ns+0x293/0x340 [ 534.779148][T20698] internal_create_group+0x560/0xf10 [ 534.784408][T20698] ? sysfs_create_group+0x20/0x20 [ 534.789407][T20698] sysfs_create_groups+0x5d/0x130 [ 534.794413][T20698] device_add+0xae5/0x18a0 [ 534.798806][T20698] ? get_device+0x30/0x30 [ 534.803117][T20698] ? virtual_device_parent+0x50/0x50 [ 534.808377][T20698] ? pm_runtime_init+0x206/0x320 [ 534.813305][T20698] ? device_initialize+0x1d3/0x3e0 [ 534.818396][T20698] netdev_register_kobject+0x178/0x310 [ 534.823833][T20698] ? raw_notifier_call_chain+0xf2/0x110 [ 534.829358][T20698] register_netdevice+0xbc7/0x1480 [ 534.834451][T20698] ? netdev_update_lockdep_key+0x10/0x10 [ 534.840055][T20698] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 534.845073][T20698] ? __rcu_read_lock+0x50/0x50 [ 534.849820][T20698] ? alloc_netdev_mqs+0xa0c/0xc60 [ 534.854815][T20698] ? vti6_locate+0x551/0x910 [ 534.859381][T20698] vti6_locate+0x610/0x910 [ 534.863776][T20698] ? cap_capable+0x23f/0x280 [ 534.868343][T20698] ? vti6_link_config+0x530/0x530 [ 534.873343][T20698] ? vti6_ioctl+0xa64/0x1b10 [ 534.877906][T20698] vti6_ioctl+0xa88/0x1b10 [ 534.882297][T20698] ? vti6_tnl_xmit+0x1720/0x1720 [ 534.887210][T20698] ? avc_has_extended_perms+0xb5e/0x1140 [ 534.892816][T20698] ? full_name_hash+0xb4/0xe0 [ 534.897468][T20698] dev_ifsioc+0x675/0xa70 [ 534.901782][T20698] ? mutex_lock+0x106/0x110 [ 534.906278][T20698] ? dev_ioctl+0xab0/0xab0 [ 534.910731][T20698] dev_ioctl+0x558/0xab0 [ 534.914952][T20698] sock_ioctl+0x677/0x760 [ 534.919258][T20698] ? sock_poll+0x2f0/0x2f0 [ 534.923651][T20698] ? memset+0x1f/0x40 [ 534.927606][T20698] ? fsnotify+0x1332/0x13f0 [ 534.932084][T20698] ? sock_poll+0x2f0/0x2f0 [ 534.936758][T20698] do_vfs_ioctl+0x76a/0x1720 [ 534.941340][T20698] ? selinux_file_ioctl+0x72f/0x990 [ 534.946532][T20698] ? ioctl_preallocate+0x250/0x250 [ 534.951627][T20698] ? __fget+0x37b/0x3c0 [ 534.955758][T20698] ? vfs_write+0x422/0x4e0 [ 534.960156][T20698] ? fget_many+0x20/0x20 [ 534.964381][T20698] ? debug_smp_processor_id+0x20/0x20 [ 534.969751][T20698] ? security_file_ioctl+0x9d/0xb0 [ 534.974857][T20698] __x64_sys_ioctl+0xd4/0x110 [ 534.979509][T20698] do_syscall_64+0xcb/0x1e0 [ 534.984004][T20698] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 534.989869][T20698] RIP: 0033:0x466459 [ 534.993752][T20698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 535.013330][T20698] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 535.021713][T20698] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 535.029675][T20698] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 535.037623][T20698] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 535.045569][T20698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 535.053516][T20698] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006c00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:20 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfe03], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:20 executing program 0 (fault-call:8 fault-nth:50): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:20 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x4b}, @mcast2}}) 21:32:20 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x1fd74], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:20 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x40000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 535.164609][T20707] x_tables: duplicate underflow at hook 2 [ 535.170820][T20708] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 535.174683][T20710] FAULT_INJECTION: forcing a failure. [ 535.174683][T20710] name failslab, interval 1, probability 0, space 0, times 0 [ 535.203848][T20711] EXT4-fs (loop1): Can't read superblock on 2nd try [ 535.210874][T20710] CPU: 1 PID: 20710 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 535.221108][T20710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.231159][T20710] Call Trace: [ 535.234653][T20710] dump_stack+0x1d8/0x24e [ 535.238968][T20710] ? devkmsg_release+0x11c/0x11c [ 535.243931][T20710] ? mutex_unlock+0x19/0x40 [ 535.248411][T20710] ? show_regs_print_info+0x12/0x12 [ 535.253625][T20710] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 535.259678][T20710] should_fail+0x6f6/0x860 [ 535.264089][T20710] ? setup_fault_attr+0x3d0/0x3d0 [ 535.269098][T20710] ? _raw_spin_lock+0xa3/0x1b0 [ 535.273846][T20710] ? __kernfs_new_node+0xdb/0x6d0 [ 535.278846][T20710] should_failslab+0x5/0x20 [ 535.283329][T20710] kmem_cache_alloc+0x36/0x290 [ 535.288070][T20710] __kernfs_new_node+0xdb/0x6d0 [ 535.292997][T20710] ? mutex_lock+0xa6/0x110 [ 535.297387][T20710] ? kernfs_new_node+0x160/0x160 [ 535.302300][T20710] ? security_kernfs_init_security+0x9a/0xb0 [ 535.308255][T20710] ? kernfs_activate+0x3fc/0x420 [ 535.313167][T20710] kernfs_new_node+0x95/0x160 [ 535.317925][T20710] __kernfs_create_file+0x45/0x260 [ 535.323009][T20710] sysfs_add_file_mode_ns+0x293/0x340 [ 535.328355][T20710] internal_create_group+0x560/0xf10 [ 535.333636][T20710] ? sysfs_create_group+0x20/0x20 [ 535.338643][T20710] sysfs_create_groups+0x5d/0x130 [ 535.343665][T20710] device_add+0xae5/0x18a0 [ 535.348055][T20710] ? get_device+0x30/0x30 [ 535.352358][T20710] ? virtual_device_parent+0x50/0x50 [ 535.357618][T20710] ? pm_runtime_init+0x206/0x320 [ 535.362528][T20710] ? device_initialize+0x1d3/0x3e0 [ 535.367630][T20710] netdev_register_kobject+0x178/0x310 [ 535.373072][T20710] ? raw_notifier_call_chain+0xf2/0x110 [ 535.378608][T20710] register_netdevice+0xbc7/0x1480 [ 535.383717][T20710] ? netdev_update_lockdep_key+0x10/0x10 [ 535.389325][T20710] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 535.394330][T20710] ? __rcu_read_lock+0x50/0x50 [ 535.399092][T20710] ? alloc_netdev_mqs+0xa0c/0xc60 [ 535.404095][T20710] ? vti6_locate+0x551/0x910 [ 535.408664][T20710] vti6_locate+0x610/0x910 [ 535.413057][T20710] ? cap_capable+0x23f/0x280 [ 535.417618][T20710] ? vti6_link_config+0x530/0x530 [ 535.422624][T20710] ? vti6_ioctl+0xa64/0x1b10 [ 535.427239][T20710] vti6_ioctl+0xa88/0x1b10 [ 535.431702][T20710] ? vti6_tnl_xmit+0x1720/0x1720 [ 535.436636][T20710] ? __rcu_read_lock+0x50/0x50 [ 535.441391][T20710] ? check_preemption_disabled+0x154/0x330 [ 535.447178][T20710] ? avc_has_extended_perms+0xb5e/0x1140 [ 535.452790][T20710] ? full_name_hash+0xb4/0xe0 [ 535.457460][T20710] dev_ifsioc+0x675/0xa70 [ 535.461769][T20710] ? mutex_lock+0xa6/0x110 [ 535.466174][T20710] ? dev_ioctl+0xab0/0xab0 [ 535.470569][T20710] dev_ioctl+0x558/0xab0 [ 535.474797][T20710] sock_ioctl+0x677/0x760 [ 535.479107][T20710] ? sock_poll+0x2f0/0x2f0 [ 535.483502][T20710] ? memset+0x1f/0x40 [ 535.487469][T20710] ? fsnotify+0x1332/0x13f0 [ 535.491954][T20710] ? sock_poll+0x2f0/0x2f0 [ 535.496355][T20710] do_vfs_ioctl+0x76a/0x1720 [ 535.500937][T20710] ? selinux_file_ioctl+0x72f/0x990 [ 535.506117][T20710] ? ioctl_preallocate+0x250/0x250 [ 535.511207][T20710] ? __fget+0x37b/0x3c0 [ 535.515514][T20710] ? vfs_write+0x422/0x4e0 [ 535.519925][T20710] ? fget_many+0x20/0x20 [ 535.524159][T20710] ? debug_smp_processor_id+0x20/0x20 [ 535.529512][T20710] ? security_file_ioctl+0x9d/0xb0 [ 535.534611][T20710] __x64_sys_ioctl+0xd4/0x110 [ 535.539280][T20710] do_syscall_64+0xcb/0x1e0 [ 535.543782][T20710] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 535.549664][T20710] RIP: 0033:0x466459 21:32:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:20 executing program 0 (fault-call:8 fault-nth:51): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 535.553532][T20710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 535.573198][T20710] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 535.581584][T20710] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 535.589533][T20710] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 535.597498][T20710] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 535.605442][T20710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 21:32:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) [ 535.613396][T20710] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 535.649099][T20723] FAULT_INJECTION: forcing a failure. [ 535.649099][T20723] name failslab, interval 1, probability 0, space 0, times 0 [ 535.662366][T20723] CPU: 1 PID: 20723 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 535.672598][T20723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.682650][T20723] Call Trace: [ 535.685940][T20723] dump_stack+0x1d8/0x24e [ 535.690248][T20723] ? devkmsg_release+0x11c/0x11c [ 535.695194][T20723] ? mutex_unlock+0x19/0x40 [ 535.699673][T20723] ? show_regs_print_info+0x12/0x12 [ 535.704845][T20723] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 535.710887][T20723] should_fail+0x6f6/0x860 [ 535.715276][T20723] ? setup_fault_attr+0x3d0/0x3d0 [ 535.720293][T20723] ? _raw_spin_lock+0xa3/0x1b0 [ 535.725031][T20723] ? __kernfs_new_node+0xdb/0x6d0 [ 535.730043][T20723] should_failslab+0x5/0x20 [ 535.734519][T20723] kmem_cache_alloc+0x36/0x290 [ 535.739257][T20723] __kernfs_new_node+0xdb/0x6d0 [ 535.744084][T20723] ? mutex_lock+0xa6/0x110 [ 535.748472][T20723] ? kernfs_new_node+0x160/0x160 [ 535.753401][T20723] ? security_kernfs_init_security+0x9a/0xb0 [ 535.759355][T20723] ? kernfs_activate+0x3fc/0x420 [ 535.764264][T20723] kernfs_new_node+0x95/0x160 [ 535.768915][T20723] __kernfs_create_file+0x45/0x260 [ 535.774025][T20723] sysfs_add_file_mode_ns+0x293/0x340 [ 535.779369][T20723] internal_create_group+0x560/0xf10 [ 535.784630][T20723] ? sysfs_create_group+0x20/0x20 [ 535.789636][T20723] sysfs_create_groups+0x5d/0x130 [ 535.794638][T20723] device_add+0xae5/0x18a0 [ 535.799055][T20723] ? get_device+0x30/0x30 [ 535.803359][T20723] ? virtual_device_parent+0x50/0x50 [ 535.808629][T20723] ? pm_runtime_init+0x206/0x320 [ 535.813539][T20723] ? device_initialize+0x1d3/0x3e0 [ 535.818627][T20723] netdev_register_kobject+0x178/0x310 [ 535.824061][T20723] ? raw_notifier_call_chain+0xf2/0x110 [ 535.829581][T20723] register_netdevice+0xbc7/0x1480 [ 535.834798][T20723] ? netdev_update_lockdep_key+0x10/0x10 [ 535.840521][T20723] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 535.845530][T20723] ? __rcu_read_lock+0x50/0x50 [ 535.850427][T20723] ? alloc_netdev_mqs+0xa0c/0xc60 [ 535.855462][T20723] ? vti6_locate+0x551/0x910 [ 535.860033][T20723] vti6_locate+0x610/0x910 [ 535.864437][T20723] ? cap_capable+0x23f/0x280 [ 535.869005][T20723] ? vti6_link_config+0x530/0x530 [ 535.875354][T20723] ? vti6_ioctl+0xa64/0x1b10 [ 535.879918][T20723] vti6_ioctl+0xa88/0x1b10 [ 535.884311][T20723] ? vti6_tnl_xmit+0x1720/0x1720 [ 535.889222][T20723] ? __rcu_read_lock+0x50/0x50 [ 535.893964][T20723] ? check_preemption_disabled+0x154/0x330 [ 535.899745][T20723] ? avc_has_extended_perms+0xb5e/0x1140 [ 535.905377][T20723] ? full_name_hash+0xb4/0xe0 [ 535.910030][T20723] dev_ifsioc+0x675/0xa70 [ 535.914335][T20723] ? mutex_lock+0xa6/0x110 [ 535.918723][T20723] ? dev_ioctl+0xab0/0xab0 [ 535.923115][T20723] dev_ioctl+0x558/0xab0 [ 535.927350][T20723] sock_ioctl+0x677/0x760 [ 535.931669][T20723] ? sock_poll+0x2f0/0x2f0 [ 535.936058][T20723] ? memset+0x1f/0x40 [ 535.940015][T20723] ? fsnotify+0x1332/0x13f0 [ 535.944490][T20723] ? sock_poll+0x2f0/0x2f0 [ 535.948878][T20723] do_vfs_ioctl+0x76a/0x1720 [ 535.953441][T20723] ? selinux_file_ioctl+0x72f/0x990 [ 535.958625][T20723] ? ioctl_preallocate+0x250/0x250 [ 535.963715][T20723] ? __fget+0x37b/0x3c0 [ 535.967851][T20723] ? vfs_write+0x422/0x4e0 [ 535.972243][T20723] ? fget_many+0x20/0x20 [ 535.976464][T20723] ? debug_smp_processor_id+0x20/0x20 [ 535.981825][T20723] ? security_file_ioctl+0x9d/0xb0 [ 535.986908][T20723] __x64_sys_ioctl+0xd4/0x110 [ 535.991559][T20723] do_syscall_64+0xcb/0x1e0 [ 535.996049][T20723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 536.001932][T20723] RIP: 0033:0x466459 [ 536.005821][T20723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 536.025414][T20723] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 536.033797][T20723] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 536.041746][T20723] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:21 executing program 0 (fault-call:8 fault-nth:52): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019007400900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:21 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x64}, @mcast2}}) [ 536.049699][T20723] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 536.057644][T20723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 536.065592][T20723] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 536.130634][T20735] x_tables: duplicate underflow at hook 2 [ 536.139400][T20734] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 536.140272][T20726] FAULT_INJECTION: forcing a failure. [ 536.140272][T20726] name failslab, interval 1, probability 0, space 0, times 0 [ 536.164198][T20739] EXT4-fs (loop1): Can't read superblock on 2nd try [ 536.169526][T20726] CPU: 1 PID: 20726 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 536.181152][T20726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.191188][T20726] Call Trace: [ 536.194463][T20726] dump_stack+0x1d8/0x24e [ 536.198777][T20726] ? devkmsg_release+0x11c/0x11c [ 536.203701][T20726] ? mutex_unlock+0x19/0x40 [ 536.208203][T20726] ? show_regs_print_info+0x12/0x12 [ 536.213379][T20726] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 536.219423][T20726] should_fail+0x6f6/0x860 [ 536.223849][T20726] ? setup_fault_attr+0x3d0/0x3d0 [ 536.228851][T20726] ? _raw_spin_lock+0xa3/0x1b0 [ 536.233587][T20726] ? __kernfs_new_node+0xdb/0x6d0 [ 536.238584][T20726] should_failslab+0x5/0x20 [ 536.243062][T20726] kmem_cache_alloc+0x36/0x290 [ 536.247821][T20726] __kernfs_new_node+0xdb/0x6d0 [ 536.252648][T20726] ? mutex_lock+0xa6/0x110 [ 536.257039][T20726] ? kernfs_new_node+0x160/0x160 [ 536.261970][T20726] ? security_kernfs_init_security+0x9a/0xb0 [ 536.267928][T20726] ? kernfs_activate+0x3fc/0x420 [ 536.272841][T20726] kernfs_new_node+0x95/0x160 [ 536.277494][T20726] __kernfs_create_file+0x45/0x260 [ 536.282581][T20726] sysfs_add_file_mode_ns+0x293/0x340 [ 536.287949][T20726] internal_create_group+0x560/0xf10 [ 536.293208][T20726] ? sysfs_create_group+0x20/0x20 [ 536.298208][T20726] sysfs_create_groups+0x5d/0x130 [ 536.303207][T20726] device_add+0xae5/0x18a0 [ 536.307628][T20726] ? get_device+0x30/0x30 [ 536.311930][T20726] ? virtual_device_parent+0x50/0x50 [ 536.317190][T20726] ? pm_runtime_init+0x206/0x320 [ 536.322120][T20726] ? device_initialize+0x1d3/0x3e0 [ 536.327205][T20726] netdev_register_kobject+0x178/0x310 [ 536.332643][T20726] ? raw_notifier_call_chain+0xf2/0x110 [ 536.338190][T20726] register_netdevice+0xbc7/0x1480 [ 536.343279][T20726] ? netdev_update_lockdep_key+0x10/0x10 [ 536.348887][T20726] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 536.353888][T20726] ? __rcu_read_lock+0x50/0x50 [ 536.358628][T20726] ? alloc_netdev_mqs+0xa0c/0xc60 [ 536.363635][T20726] ? vti6_locate+0x551/0x910 [ 536.368201][T20726] vti6_locate+0x610/0x910 [ 536.372617][T20726] ? cap_capable+0x23f/0x280 [ 536.377624][T20726] ? vti6_link_config+0x530/0x530 [ 536.382634][T20726] ? vti6_ioctl+0xa64/0x1b10 [ 536.387199][T20726] vti6_ioctl+0xa88/0x1b10 [ 536.391595][T20726] ? vti6_tnl_xmit+0x1720/0x1720 [ 536.396526][T20726] ? __rcu_read_lock+0x50/0x50 [ 536.401267][T20726] ? check_preemption_disabled+0x154/0x330 [ 536.407112][T20726] ? avc_has_extended_perms+0xb5e/0x1140 [ 536.412717][T20726] ? full_name_hash+0xb4/0xe0 [ 536.417369][T20726] dev_ifsioc+0x675/0xa70 [ 536.421693][T20726] ? mutex_lock+0xa6/0x110 [ 536.426081][T20726] ? dev_ioctl+0xab0/0xab0 [ 536.430481][T20726] dev_ioctl+0x558/0xab0 [ 536.434698][T20726] sock_ioctl+0x677/0x760 [ 536.439002][T20726] ? sock_poll+0x2f0/0x2f0 [ 536.443390][T20726] ? memset+0x1f/0x40 [ 536.447343][T20726] ? fsnotify+0x1332/0x13f0 [ 536.451819][T20726] ? sock_poll+0x2f0/0x2f0 [ 536.456220][T20726] do_vfs_ioctl+0x76a/0x1720 [ 536.460793][T20726] ? selinux_file_ioctl+0x72f/0x990 [ 536.465975][T20726] ? ioctl_preallocate+0x250/0x250 [ 536.471076][T20726] ? __fget+0x37b/0x3c0 [ 536.475278][T20726] ? vfs_write+0x422/0x4e0 [ 536.479688][T20726] ? fget_many+0x20/0x20 [ 536.483911][T20726] ? debug_smp_processor_id+0x20/0x20 [ 536.489260][T20726] ? security_file_ioctl+0x9d/0xb0 [ 536.494356][T20726] __x64_sys_ioctl+0xd4/0x110 [ 536.499018][T20726] do_syscall_64+0xcb/0x1e0 [ 536.503524][T20726] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 536.509391][T20726] RIP: 0033:0x466459 21:32:21 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x1000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:21 executing program 0 (fault-call:8 fault-nth:53): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 536.513278][T20726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 536.532854][T20726] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 536.541241][T20726] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 536.551981][T20726] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 536.560104][T20726] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 536.568056][T20726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 21:32:21 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019007a00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 536.576008][T20726] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x9], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:21 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x2000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 536.624963][T20748] secmark_tg_check: 11 callbacks suppressed [ 536.624968][T20748] xt_SECMARK: invalid mode: 0 [ 536.631836][T20751] x_tables: duplicate underflow at hook 2 [ 536.646926][T20753] xt_SECMARK: invalid mode: 0 [ 536.651974][T20752] FAULT_INJECTION: forcing a failure. [ 536.651974][T20752] name failslab, interval 1, probability 0, space 0, times 0 [ 536.665819][T20752] CPU: 1 PID: 20752 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 536.676064][T20752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.680215][T20759] x_tables: duplicate underflow at hook 2 [ 536.686198][T20752] Call Trace: [ 536.686222][T20752] dump_stack+0x1d8/0x24e [ 536.686234][T20752] ? devkmsg_release+0x11c/0x11c [ 536.686250][T20752] ? mutex_unlock+0x19/0x40 [ 536.708963][T20752] ? show_regs_print_info+0x12/0x12 [ 536.714158][T20752] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 536.720297][T20752] should_fail+0x6f6/0x860 [ 536.724693][T20752] ? setup_fault_attr+0x3d0/0x3d0 [ 536.729703][T20752] ? _raw_spin_lock+0xa3/0x1b0 [ 536.734453][T20752] ? __kernfs_new_node+0xdb/0x6d0 [ 536.739450][T20752] should_failslab+0x5/0x20 [ 536.743929][T20752] kmem_cache_alloc+0x36/0x290 [ 536.748668][T20752] __kernfs_new_node+0xdb/0x6d0 [ 536.753494][T20752] ? mutex_lock+0xa6/0x110 [ 536.757882][T20752] ? kernfs_new_node+0x160/0x160 [ 536.762794][T20752] ? security_kernfs_init_security+0x9a/0xb0 [ 536.768761][T20752] ? kernfs_activate+0x3fc/0x420 [ 536.773670][T20752] kernfs_new_node+0x95/0x160 [ 536.778319][T20752] __kernfs_create_file+0x45/0x260 [ 536.783404][T20752] sysfs_add_file_mode_ns+0x293/0x340 [ 536.788749][T20752] internal_create_group+0x560/0xf10 [ 536.794025][T20752] ? sysfs_create_group+0x20/0x20 [ 536.799042][T20752] sysfs_create_groups+0x5d/0x130 [ 536.804058][T20752] device_add+0xae5/0x18a0 [ 536.808452][T20752] ? get_device+0x30/0x30 [ 536.812754][T20752] ? virtual_device_parent+0x50/0x50 [ 536.818009][T20752] ? pm_runtime_init+0x206/0x320 [ 536.822917][T20752] ? device_initialize+0x1d3/0x3e0 [ 536.828001][T20752] netdev_register_kobject+0x178/0x310 [ 536.833433][T20752] ? raw_notifier_call_chain+0xf2/0x110 [ 536.838949][T20752] register_netdevice+0xbc7/0x1480 [ 536.844036][T20752] ? netdev_update_lockdep_key+0x10/0x10 [ 536.849648][T20752] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 536.854647][T20752] ? __rcu_read_lock+0x50/0x50 [ 536.859381][T20752] ? alloc_netdev_mqs+0xa0c/0xc60 [ 536.864378][T20752] ? vti6_locate+0x551/0x910 [ 536.868939][T20752] vti6_locate+0x610/0x910 [ 536.873330][T20752] ? cap_capable+0x23f/0x280 [ 536.877891][T20752] ? vti6_link_config+0x530/0x530 [ 536.882886][T20752] ? vti6_ioctl+0xa64/0x1b10 [ 536.887446][T20752] vti6_ioctl+0xa88/0x1b10 [ 536.891853][T20752] ? vti6_tnl_xmit+0x1720/0x1720 [ 536.896765][T20752] ? __rcu_read_lock+0x50/0x50 [ 536.901500][T20752] ? check_preemption_disabled+0x154/0x330 [ 536.907421][T20752] ? avc_has_extended_perms+0xb5e/0x1140 [ 536.913034][T20752] ? full_name_hash+0xb4/0xe0 [ 536.917685][T20752] dev_ifsioc+0x675/0xa70 [ 536.921988][T20752] ? mutex_lock+0xa6/0x110 [ 536.926375][T20752] ? dev_ioctl+0xab0/0xab0 [ 536.930764][T20752] dev_ioctl+0x558/0xab0 [ 536.934980][T20752] sock_ioctl+0x677/0x760 [ 536.939280][T20752] ? sock_poll+0x2f0/0x2f0 [ 536.943677][T20752] ? memset+0x1f/0x40 [ 536.947629][T20752] ? fsnotify+0x1332/0x13f0 [ 536.952103][T20752] ? sock_poll+0x2f0/0x2f0 [ 536.956491][T20752] do_vfs_ioctl+0x76a/0x1720 [ 536.961055][T20752] ? selinux_file_ioctl+0x72f/0x990 [ 536.966227][T20752] ? ioctl_preallocate+0x250/0x250 [ 536.971311][T20752] ? __fget+0x37b/0x3c0 [ 536.975438][T20752] ? vfs_write+0x422/0x4e0 [ 536.979826][T20752] ? fget_many+0x20/0x20 [ 536.984042][T20752] ? debug_smp_processor_id+0x20/0x20 [ 536.989390][T20752] ? security_file_ioctl+0x9d/0xb0 [ 536.994472][T20752] __x64_sys_ioctl+0xd4/0x110 [ 536.999124][T20752] do_syscall_64+0xcb/0x1e0 [ 537.003603][T20752] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 537.009467][T20752] RIP: 0033:0x466459 21:32:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xa], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 537.013335][T20752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 537.032909][T20752] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 537.041292][T20752] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 537.049236][T20752] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 537.057296][T20752] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 537.065250][T20752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 21:32:22 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x3000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:22 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x71}, @mcast2}}) 21:32:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xb], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:22 executing program 0 (fault-call:8 fault-nth:54): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 537.073198][T20752] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 537.091937][T20763] xt_SECMARK: invalid mode: 0 [ 537.097004][T20756] EXT4-fs (loop1): Can't read superblock on 2nd try [ 537.104669][T20764] xt_SECMARK: invalid mode: 0 21:32:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xc], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 537.122953][T20750] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 537.138422][T20756] EXT4-fs (loop1): Can't read superblock on 2nd try [ 537.161359][T20774] FAULT_INJECTION: forcing a failure. [ 537.161359][T20774] name failslab, interval 1, probability 0, space 0, times 0 21:32:22 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x4000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 537.166181][T20775] xt_SECMARK: invalid mode: 0 [ 537.181634][T20774] CPU: 0 PID: 20774 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 537.183006][T20777] xt_SECMARK: invalid mode: 0 [ 537.191890][T20774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.191894][T20774] Call Trace: [ 537.191920][T20774] dump_stack+0x1d8/0x24e [ 537.191933][T20774] ? devkmsg_release+0x11c/0x11c [ 537.191941][T20774] ? mutex_unlock+0x19/0x40 [ 537.191948][T20774] ? show_regs_print_info+0x12/0x12 [ 537.191957][T20774] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 537.191967][T20774] should_fail+0x6f6/0x860 [ 537.191975][T20774] ? setup_fault_attr+0x3d0/0x3d0 [ 537.191984][T20774] ? _raw_spin_lock+0xa3/0x1b0 [ 537.191992][T20774] ? __kernfs_new_node+0xdb/0x6d0 [ 537.192000][T20774] should_failslab+0x5/0x20 [ 537.192009][T20774] kmem_cache_alloc+0x36/0x290 [ 537.192021][T20774] __kernfs_new_node+0xdb/0x6d0 [ 537.192031][T20774] ? mutex_lock+0xa6/0x110 [ 537.192040][T20774] ? kernfs_new_node+0x160/0x160 [ 537.192050][T20774] ? security_kernfs_init_security+0x9a/0xb0 [ 537.192061][T20774] ? kernfs_activate+0x3fc/0x420 [ 537.192070][T20774] kernfs_new_node+0x95/0x160 [ 537.192085][T20774] __kernfs_create_file+0x45/0x260 [ 537.298058][T20774] sysfs_add_file_mode_ns+0x293/0x340 [ 537.303424][T20774] internal_create_group+0x560/0xf10 [ 537.308685][T20774] ? sysfs_create_group+0x20/0x20 [ 537.313704][T20774] sysfs_create_groups+0x5d/0x130 [ 537.318709][T20774] device_add+0xae5/0x18a0 [ 537.323185][T20774] ? get_device+0x30/0x30 [ 537.327489][T20774] ? virtual_device_parent+0x50/0x50 [ 537.332748][T20774] ? pm_runtime_init+0x206/0x320 [ 537.337677][T20774] ? device_initialize+0x1d3/0x3e0 [ 537.342767][T20774] netdev_register_kobject+0x178/0x310 [ 537.348202][T20774] ? raw_notifier_call_chain+0xf2/0x110 [ 537.353722][T20774] register_netdevice+0xbc7/0x1480 [ 537.358831][T20774] ? netdev_update_lockdep_key+0x10/0x10 [ 537.364453][T20774] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 537.369459][T20774] ? __rcu_read_lock+0x50/0x50 [ 537.374208][T20774] ? alloc_netdev_mqs+0xa0c/0xc60 [ 537.379208][T20774] ? vti6_locate+0x551/0x910 [ 537.383774][T20774] vti6_locate+0x610/0x910 [ 537.388169][T20774] ? cap_capable+0x23f/0x280 [ 537.392843][T20774] ? vti6_link_config+0x530/0x530 [ 537.397853][T20774] ? vti6_ioctl+0xa64/0x1b10 [ 537.402427][T20774] vti6_ioctl+0xa88/0x1b10 [ 537.406822][T20774] ? vti6_tnl_xmit+0x1720/0x1720 [ 537.411739][T20774] ? __rcu_read_lock+0x50/0x50 [ 537.416501][T20774] ? check_preemption_disabled+0x154/0x330 [ 537.422315][T20774] ? avc_has_extended_perms+0xb5e/0x1140 [ 537.427925][T20774] ? full_name_hash+0xb4/0xe0 [ 537.432581][T20774] dev_ifsioc+0x675/0xa70 [ 537.436891][T20774] ? mutex_lock+0xa6/0x110 [ 537.441285][T20774] ? dev_ioctl+0xab0/0xab0 [ 537.445678][T20774] dev_ioctl+0x558/0xab0 [ 537.449920][T20774] sock_ioctl+0x677/0x760 [ 537.454233][T20774] ? sock_poll+0x2f0/0x2f0 [ 537.458849][T20774] ? __perf_event_task_sched_in+0x57c/0x5e0 [ 537.464751][T20774] ? sock_poll+0x2f0/0x2f0 [ 537.469149][T20774] do_vfs_ioctl+0x76a/0x1720 [ 537.473723][T20774] ? selinux_file_ioctl+0x72f/0x990 [ 537.478900][T20774] ? ioctl_preallocate+0x250/0x250 [ 537.483996][T20774] ? _raw_spin_unlock_irq+0x4a/0x60 [ 537.489183][T20774] ? finish_task_switch+0x130/0x550 [ 537.494359][T20774] ? __fget+0x37b/0x3c0 [ 537.498494][T20774] ? debug_smp_processor_id+0x20/0x20 [ 537.503843][T20774] ? fget_many+0x20/0x20 [ 537.508061][T20774] ? __fpregs_load_activate+0x1d7/0x3c0 [ 537.513585][T20774] ? security_file_ioctl+0x9d/0xb0 [ 537.518678][T20774] __x64_sys_ioctl+0xd4/0x110 [ 537.523345][T20774] do_syscall_64+0xcb/0x1e0 [ 537.527829][T20774] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 537.533837][T20774] RIP: 0033:0x466459 [ 537.537710][T20774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 537.557311][T20774] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 537.565724][T20774] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:22 executing program 0 (fault-call:8 fault-nth:55): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:22 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e300900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 537.573675][T20774] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 537.581625][T20774] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 537.589586][T20774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 537.597542][T20774] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:22 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x5000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 537.657491][T20785] xt_SECMARK: invalid mode: 0 [ 537.657816][T20780] FAULT_INJECTION: forcing a failure. [ 537.657816][T20780] name failslab, interval 1, probability 0, space 0, times 0 [ 537.663103][T20789] xt_SECMARK: invalid mode: 0 [ 537.675580][T20780] CPU: 0 PID: 20780 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 537.686897][T20787] xt_check_table_hooks: 2 callbacks suppressed [ 537.686903][T20787] x_tables: duplicate underflow at hook 2 [ 537.689853][T20780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.689857][T20780] Call Trace: [ 537.689877][T20780] dump_stack+0x1d8/0x24e [ 537.689888][T20780] ? devkmsg_release+0x11c/0x11c [ 537.689896][T20780] ? mutex_unlock+0x19/0x40 [ 537.689903][T20780] ? show_regs_print_info+0x12/0x12 [ 537.689920][T20780] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 537.739931][T20780] should_fail+0x6f6/0x860 [ 537.744344][T20780] ? setup_fault_attr+0x3d0/0x3d0 [ 537.749344][T20780] ? _raw_spin_lock+0xa3/0x1b0 [ 537.754096][T20780] ? __kernfs_new_node+0xdb/0x6d0 [ 537.759093][T20780] should_failslab+0x5/0x20 [ 537.763570][T20780] kmem_cache_alloc+0x36/0x290 [ 537.768307][T20780] __kernfs_new_node+0xdb/0x6d0 [ 537.773134][T20780] ? mutex_lock+0xa6/0x110 [ 537.777537][T20780] ? kernfs_new_node+0x160/0x160 [ 537.782450][T20780] ? security_kernfs_init_security+0x9a/0xb0 [ 537.788420][T20780] ? kernfs_activate+0x3fc/0x420 [ 537.793334][T20780] kernfs_new_node+0x95/0x160 [ 537.797984][T20780] __kernfs_create_file+0x45/0x260 [ 537.803073][T20780] sysfs_add_file_mode_ns+0x293/0x340 [ 537.808419][T20780] internal_create_group+0x560/0xf10 [ 537.813679][T20780] ? sysfs_create_group+0x20/0x20 [ 537.818676][T20780] sysfs_create_groups+0x5d/0x130 [ 537.823676][T20780] device_add+0xae5/0x18a0 [ 537.828065][T20780] ? get_device+0x30/0x30 [ 537.832374][T20780] ? virtual_device_parent+0x50/0x50 [ 537.837632][T20780] ? pm_runtime_init+0x206/0x320 [ 537.842540][T20780] ? device_initialize+0x1d3/0x3e0 [ 537.847624][T20780] netdev_register_kobject+0x178/0x310 [ 537.853058][T20780] ? raw_notifier_call_chain+0xf2/0x110 [ 537.858602][T20780] register_netdevice+0xbc7/0x1480 [ 537.863710][T20780] ? netdev_update_lockdep_key+0x10/0x10 [ 537.869320][T20780] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 537.874319][T20780] ? __rcu_read_lock+0x50/0x50 [ 537.879054][T20780] ? alloc_netdev_mqs+0xa0c/0xc60 [ 537.884053][T20780] ? vti6_locate+0x551/0x910 [ 537.888633][T20780] vti6_locate+0x610/0x910 [ 537.893025][T20780] ? cap_capable+0x23f/0x280 [ 537.897605][T20780] ? vti6_link_config+0x530/0x530 [ 537.902601][T20780] ? vti6_ioctl+0xa64/0x1b10 [ 537.907161][T20780] vti6_ioctl+0xa88/0x1b10 [ 537.911685][T20780] ? vti6_tnl_xmit+0x1720/0x1720 [ 537.916618][T20780] ? __rcu_read_lock+0x50/0x50 [ 537.921368][T20780] ? check_preemption_disabled+0x154/0x330 [ 537.927151][T20780] ? avc_has_extended_perms+0xb5e/0x1140 [ 537.932756][T20780] ? full_name_hash+0xb4/0xe0 [ 537.937494][T20780] dev_ifsioc+0x675/0xa70 [ 537.941802][T20780] ? mutex_lock+0xa6/0x110 [ 537.946189][T20780] ? dev_ioctl+0xab0/0xab0 [ 537.950581][T20780] dev_ioctl+0x558/0xab0 [ 537.954796][T20780] sock_ioctl+0x677/0x760 [ 537.959098][T20780] ? sock_poll+0x2f0/0x2f0 [ 537.963489][T20780] ? memset+0x1f/0x40 [ 537.967448][T20780] ? fsnotify+0x1332/0x13f0 [ 537.971924][T20780] ? sock_poll+0x2f0/0x2f0 [ 537.976315][T20780] do_vfs_ioctl+0x76a/0x1720 [ 537.980878][T20780] ? selinux_file_ioctl+0x72f/0x990 [ 537.986063][T20780] ? ioctl_preallocate+0x250/0x250 [ 537.991149][T20780] ? __fget+0x37b/0x3c0 [ 537.995277][T20780] ? vfs_write+0x422/0x4e0 [ 537.999666][T20780] ? fget_many+0x20/0x20 [ 538.003881][T20780] ? debug_smp_processor_id+0x20/0x20 [ 538.009224][T20780] ? security_file_ioctl+0x9d/0xb0 [ 538.014309][T20780] __x64_sys_ioctl+0xd4/0x110 [ 538.018961][T20780] do_syscall_64+0xcb/0x1e0 [ 538.023439][T20780] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 538.029304][T20780] RIP: 0033:0x466459 [ 538.033175][T20780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 21:32:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xd], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:23 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x110}, @mcast2}}) 21:32:23 executing program 0 (fault-call:8 fault-nth:56): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 538.052769][T20780] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 538.061158][T20780] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 538.069102][T20780] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 538.077045][T20780] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 538.085946][T20780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 538.093891][T20780] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 538.130919][T20788] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 538.146675][T20786] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:23 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x6000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 538.177233][T20795] xt_SECMARK: invalid mode: 0 [ 538.178886][T20799] FAULT_INJECTION: forcing a failure. [ 538.178886][T20799] name failslab, interval 1, probability 0, space 0, times 0 [ 538.182186][T20797] x_tables: duplicate underflow at hook 2 [ 538.200548][T20799] CPU: 0 PID: 20799 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 538.210783][T20799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.220832][T20799] Call Trace: [ 538.224122][T20799] dump_stack+0x1d8/0x24e [ 538.224347][T20802] xt_SECMARK: invalid mode: 0 [ 538.228445][T20799] ? devkmsg_release+0x11c/0x11c [ 538.228456][T20799] ? mutex_unlock+0x19/0x40 [ 538.228466][T20799] ? show_regs_print_info+0x12/0x12 [ 538.228482][T20799] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 538.253928][T20799] should_fail+0x6f6/0x860 [ 538.258332][T20799] ? setup_fault_attr+0x3d0/0x3d0 [ 538.263332][T20799] ? _raw_spin_lock+0xa3/0x1b0 [ 538.268097][T20799] ? __kernfs_new_node+0xdb/0x6d0 [ 538.273106][T20799] should_failslab+0x5/0x20 [ 538.277583][T20799] kmem_cache_alloc+0x36/0x290 [ 538.282330][T20799] __kernfs_new_node+0xdb/0x6d0 [ 538.287167][T20799] ? mutex_lock+0xa6/0x110 [ 538.291577][T20799] ? kernfs_new_node+0x160/0x160 [ 538.296494][T20799] ? security_kernfs_init_security+0x9a/0xb0 [ 538.302454][T20799] ? kernfs_activate+0x3fc/0x420 [ 538.307369][T20799] kernfs_new_node+0x95/0x160 [ 538.312023][T20799] __kernfs_create_file+0x45/0x260 [ 538.317114][T20799] sysfs_add_file_mode_ns+0x293/0x340 [ 538.322468][T20799] internal_create_group+0x560/0xf10 [ 538.327728][T20799] ? sysfs_create_group+0x20/0x20 [ 538.332726][T20799] sysfs_create_groups+0x5d/0x130 [ 538.337737][T20799] device_add+0xae5/0x18a0 [ 538.342136][T20799] ? get_device+0x30/0x30 [ 538.346520][T20799] ? virtual_device_parent+0x50/0x50 [ 538.351836][T20799] ? pm_runtime_init+0x206/0x320 [ 538.356756][T20799] ? device_initialize+0x1d3/0x3e0 [ 538.361847][T20799] netdev_register_kobject+0x178/0x310 [ 538.367284][T20799] ? raw_notifier_call_chain+0xf2/0x110 [ 538.372805][T20799] register_netdevice+0xbc7/0x1480 [ 538.377902][T20799] ? netdev_update_lockdep_key+0x10/0x10 [ 538.383522][T20799] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 538.388528][T20799] ? __rcu_read_lock+0x50/0x50 [ 538.393314][T20799] ? alloc_netdev_mqs+0xa0c/0xc60 [ 538.398318][T20799] ? vti6_locate+0x551/0x910 [ 538.402881][T20799] vti6_locate+0x610/0x910 [ 538.407282][T20799] ? cap_capable+0x23f/0x280 [ 538.411862][T20799] ? vti6_link_config+0x530/0x530 [ 538.416857][T20799] ? vti6_ioctl+0xa64/0x1b10 [ 538.421425][T20799] vti6_ioctl+0xa88/0x1b10 [ 538.425826][T20799] ? vti6_tnl_xmit+0x1720/0x1720 [ 538.430747][T20799] ? __rcu_read_lock+0x50/0x50 [ 538.435485][T20799] ? check_preemption_disabled+0x154/0x330 [ 538.441270][T20799] ? avc_has_extended_perms+0xb5e/0x1140 [ 538.446876][T20799] ? full_name_hash+0xb4/0xe0 [ 538.451526][T20799] dev_ifsioc+0x675/0xa70 [ 538.455831][T20799] ? mutex_lock+0xa6/0x110 [ 538.460241][T20799] ? dev_ioctl+0xab0/0xab0 [ 538.464632][T20799] dev_ioctl+0x558/0xab0 [ 538.468851][T20799] sock_ioctl+0x677/0x760 [ 538.473158][T20799] ? sock_poll+0x2f0/0x2f0 [ 538.477548][T20799] ? memset+0x1f/0x40 [ 538.481525][T20799] ? fsnotify+0x1332/0x13f0 [ 538.485999][T20799] ? sock_poll+0x2f0/0x2f0 [ 538.490393][T20799] do_vfs_ioctl+0x76a/0x1720 [ 538.494978][T20799] ? selinux_file_ioctl+0x72f/0x990 [ 538.500155][T20799] ? ioctl_preallocate+0x250/0x250 [ 538.505261][T20799] ? __fget+0x37b/0x3c0 [ 538.509418][T20799] ? vfs_write+0x422/0x4e0 [ 538.513808][T20799] ? fget_many+0x20/0x20 [ 538.518027][T20799] ? debug_smp_processor_id+0x20/0x20 [ 538.523376][T20799] ? security_file_ioctl+0x9d/0xb0 [ 538.528466][T20799] __x64_sys_ioctl+0xd4/0x110 [ 538.533118][T20799] do_syscall_64+0xcb/0x1e0 [ 538.537595][T20799] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 538.543458][T20799] RIP: 0033:0x466459 [ 538.547324][T20799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 538.566900][T20799] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:32:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xe], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:23 executing program 0 (fault-call:8 fault-nth:57): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 538.575292][T20799] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 538.583247][T20799] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 538.591198][T20799] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 538.599144][T20799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 538.607092][T20799] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 538.639529][T20806] FAULT_INJECTION: forcing a failure. [ 538.639529][T20806] name failslab, interval 1, probability 0, space 0, times 0 [ 538.652437][T20806] CPU: 1 PID: 20806 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 538.662899][T20806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.672936][T20806] Call Trace: [ 538.676343][T20806] dump_stack+0x1d8/0x24e [ 538.680670][T20806] ? devkmsg_release+0x11c/0x11c [ 538.685639][T20806] ? mutex_unlock+0x19/0x40 [ 538.690124][T20806] ? show_regs_print_info+0x12/0x12 [ 538.695362][T20806] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 538.701406][T20806] should_fail+0x6f6/0x860 [ 538.705810][T20806] ? setup_fault_attr+0x3d0/0x3d0 [ 538.710848][T20806] ? _raw_spin_lock+0xa3/0x1b0 [ 538.715610][T20806] ? __kernfs_new_node+0xdb/0x6d0 [ 538.720620][T20806] should_failslab+0x5/0x20 [ 538.725102][T20806] kmem_cache_alloc+0x36/0x290 [ 538.729842][T20806] __kernfs_new_node+0xdb/0x6d0 [ 538.734689][T20806] ? mutex_lock+0xa6/0x110 [ 538.739079][T20806] ? kernfs_new_node+0x160/0x160 [ 538.743993][T20806] ? security_kernfs_init_security+0x9a/0xb0 [ 538.749966][T20806] ? kernfs_activate+0x3fc/0x420 [ 538.754880][T20806] kernfs_new_node+0x95/0x160 [ 538.759530][T20806] __kernfs_create_file+0x45/0x260 [ 538.764619][T20806] sysfs_add_file_mode_ns+0x293/0x340 [ 538.769964][T20806] internal_create_group+0x560/0xf10 [ 538.775227][T20806] ? sysfs_create_group+0x20/0x20 [ 538.780232][T20806] sysfs_create_groups+0x5d/0x130 [ 538.785235][T20806] device_add+0xae5/0x18a0 [ 538.789627][T20806] ? get_device+0x30/0x30 [ 538.793949][T20806] ? virtual_device_parent+0x50/0x50 [ 538.799212][T20806] ? pm_runtime_init+0x206/0x320 [ 538.804127][T20806] ? device_initialize+0x1d3/0x3e0 [ 538.809215][T20806] netdev_register_kobject+0x178/0x310 [ 538.814648][T20806] ? raw_notifier_call_chain+0xf2/0x110 [ 538.820361][T20806] register_netdevice+0xbc7/0x1480 [ 538.825450][T20806] ? netdev_update_lockdep_key+0x10/0x10 [ 538.831057][T20806] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 538.836072][T20806] ? __rcu_read_lock+0x50/0x50 [ 538.840819][T20806] ? alloc_netdev_mqs+0xa0c/0xc60 [ 538.845822][T20806] ? vti6_locate+0x551/0x910 [ 538.850393][T20806] vti6_locate+0x610/0x910 [ 538.854806][T20806] ? cap_capable+0x23f/0x280 [ 538.859459][T20806] ? vti6_link_config+0x530/0x530 [ 538.864566][T20806] ? vti6_ioctl+0xa64/0x1b10 [ 538.869175][T20806] vti6_ioctl+0xa88/0x1b10 [ 538.873572][T20806] ? vti6_tnl_xmit+0x1720/0x1720 [ 538.878486][T20806] ? __rcu_read_lock+0x50/0x50 [ 538.883235][T20806] ? check_preemption_disabled+0x154/0x330 [ 538.889041][T20806] ? avc_has_extended_perms+0xb5e/0x1140 [ 538.894650][T20806] ? full_name_hash+0xb4/0xe0 [ 538.899314][T20806] dev_ifsioc+0x675/0xa70 [ 538.903636][T20806] ? mutex_lock+0xa6/0x110 [ 538.908036][T20806] ? dev_ioctl+0xab0/0xab0 [ 538.912479][T20806] dev_ioctl+0x558/0xab0 [ 538.916699][T20806] sock_ioctl+0x677/0x760 [ 538.921005][T20806] ? sock_poll+0x2f0/0x2f0 [ 538.925406][T20806] ? memset+0x1f/0x40 [ 538.929372][T20806] ? fsnotify+0x1332/0x13f0 [ 538.933973][T20806] ? sock_poll+0x2f0/0x2f0 [ 538.938373][T20806] do_vfs_ioctl+0x76a/0x1720 [ 538.943027][T20806] ? selinux_file_ioctl+0x72f/0x990 [ 538.948207][T20806] ? ioctl_preallocate+0x250/0x250 [ 538.953309][T20806] ? __fget+0x37b/0x3c0 [ 538.957448][T20806] ? vfs_write+0x422/0x4e0 [ 538.961856][T20806] ? fget_many+0x20/0x20 [ 538.966076][T20806] ? debug_smp_processor_id+0x20/0x20 [ 538.971424][T20806] ? security_file_ioctl+0x9d/0xb0 [ 538.976525][T20806] __x64_sys_ioctl+0xd4/0x110 [ 538.981197][T20806] do_syscall_64+0xcb/0x1e0 [ 538.985675][T20806] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 538.991543][T20806] RIP: 0033:0x466459 [ 538.995499][T20806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 539.015096][T20806] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 539.023569][T20806] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 539.031518][T20806] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e400900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:24 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x7000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:24 executing program 0 (fault-call:8 fault-nth:58): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 539.039475][T20806] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 539.047519][T20806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 539.055467][T20806] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:24 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x300}, @mcast2}}) 21:32:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x10], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:24 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x8000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 539.113687][T20817] EXT4-fs (loop1): Can't read superblock on 2nd try [ 539.115955][T20816] x_tables: duplicate underflow at hook 2 [ 539.142733][T20824] FAULT_INJECTION: forcing a failure. [ 539.142733][T20824] name failslab, interval 1, probability 0, space 0, times 0 [ 539.156028][T20824] CPU: 0 PID: 20824 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 539.166264][T20824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.176315][T20824] Call Trace: [ 539.179607][T20824] dump_stack+0x1d8/0x24e [ 539.183942][T20824] ? devkmsg_release+0x11c/0x11c [ 539.188887][T20824] ? mutex_unlock+0x19/0x40 [ 539.193133][T20817] EXT4-fs (loop1): Can't read superblock on 2nd try [ 539.193395][T20824] ? show_regs_print_info+0x12/0x12 [ 539.205331][T20824] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 539.211390][T20824] should_fail+0x6f6/0x860 [ 539.216046][T20824] ? setup_fault_attr+0x3d0/0x3d0 [ 539.221060][T20824] ? _raw_spin_lock+0xa3/0x1b0 [ 539.225945][T20824] ? __kernfs_new_node+0xdb/0x6d0 [ 539.230959][T20824] should_failslab+0x5/0x20 [ 539.235440][T20824] kmem_cache_alloc+0x36/0x290 [ 539.240197][T20824] __kernfs_new_node+0xdb/0x6d0 [ 539.245028][T20824] ? mutex_lock+0xa6/0x110 [ 539.249420][T20824] ? kernfs_new_node+0x160/0x160 [ 539.254334][T20824] ? security_kernfs_init_security+0x9a/0xb0 [ 539.260288][T20824] ? kernfs_activate+0x3fc/0x420 [ 539.265200][T20824] kernfs_new_node+0x95/0x160 [ 539.269863][T20824] __kernfs_create_file+0x45/0x260 [ 539.274971][T20824] sysfs_add_file_mode_ns+0x293/0x340 [ 539.280328][T20824] internal_create_group+0x560/0xf10 [ 539.285591][T20824] ? sysfs_create_group+0x20/0x20 [ 539.290601][T20824] sysfs_create_groups+0x5d/0x130 [ 539.295622][T20824] device_add+0xae5/0x18a0 [ 539.300030][T20824] ? get_device+0x30/0x30 [ 539.304344][T20824] ? virtual_device_parent+0x50/0x50 [ 539.309619][T20824] ? pm_runtime_init+0x206/0x320 [ 539.314537][T20824] ? device_initialize+0x1d3/0x3e0 [ 539.319634][T20824] netdev_register_kobject+0x178/0x310 [ 539.325072][T20824] ? raw_notifier_call_chain+0xf2/0x110 [ 539.330595][T20824] register_netdevice+0xbc7/0x1480 [ 539.335685][T20824] ? netdev_update_lockdep_key+0x10/0x10 [ 539.341305][T20824] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 539.346307][T20824] ? __rcu_read_lock+0x50/0x50 [ 539.351045][T20824] ? alloc_netdev_mqs+0xa0c/0xc60 [ 539.356044][T20824] ? vti6_locate+0x551/0x910 [ 539.360609][T20824] vti6_locate+0x610/0x910 [ 539.365025][T20824] ? cap_capable+0x23f/0x280 [ 539.369593][T20824] ? vti6_link_config+0x530/0x530 [ 539.374592][T20824] ? vti6_ioctl+0xa64/0x1b10 [ 539.379157][T20824] vti6_ioctl+0xa88/0x1b10 [ 539.383574][T20824] ? vti6_tnl_xmit+0x1720/0x1720 [ 539.388634][T20824] ? __rcu_read_lock+0x50/0x50 [ 539.393557][T20824] ? check_preemption_disabled+0x154/0x330 [ 539.399346][T20824] ? avc_has_extended_perms+0xb5e/0x1140 [ 539.404980][T20824] ? full_name_hash+0xb4/0xe0 [ 539.409630][T20824] dev_ifsioc+0x675/0xa70 [ 539.413936][T20824] ? mutex_lock+0xa6/0x110 [ 539.418329][T20824] ? dev_ioctl+0xab0/0xab0 [ 539.422719][T20824] dev_ioctl+0x558/0xab0 [ 539.426938][T20824] sock_ioctl+0x677/0x760 [ 539.431244][T20824] ? sock_poll+0x2f0/0x2f0 [ 539.435636][T20824] ? memset+0x1f/0x40 [ 539.439591][T20824] ? fsnotify+0x1332/0x13f0 [ 539.444066][T20824] ? sock_poll+0x2f0/0x2f0 [ 539.448454][T20824] do_vfs_ioctl+0x76a/0x1720 [ 539.453039][T20824] ? selinux_file_ioctl+0x72f/0x990 [ 539.458274][T20824] ? ioctl_preallocate+0x250/0x250 [ 539.463370][T20824] ? __fget+0x37b/0x3c0 [ 539.467506][T20824] ? vfs_write+0x422/0x4e0 [ 539.471903][T20824] ? fget_many+0x20/0x20 [ 539.476254][T20824] ? debug_smp_processor_id+0x20/0x20 [ 539.481609][T20824] ? security_file_ioctl+0x9d/0xb0 [ 539.486715][T20824] __x64_sys_ioctl+0xd4/0x110 [ 539.491378][T20824] do_syscall_64+0xcb/0x1e0 [ 539.495867][T20824] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 539.501744][T20824] RIP: 0033:0x466459 21:32:24 executing program 0 (fault-call:8 fault-nth:59): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 539.505647][T20824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 539.525354][T20824] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 539.533747][T20824] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 539.541709][T20824] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 539.549656][T20824] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 539.557601][T20824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 21:32:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e500900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x11], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 539.565553][T20824] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 539.594530][T20829] FAULT_INJECTION: forcing a failure. [ 539.594530][T20829] name failslab, interval 1, probability 0, space 0, times 0 [ 539.612928][T20832] x_tables: duplicate underflow at hook 2 [ 539.619682][T20829] CPU: 0 PID: 20829 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 539.629920][T20829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.639971][T20829] Call Trace: [ 539.643268][T20829] dump_stack+0x1d8/0x24e [ 539.647601][T20829] ? devkmsg_release+0x11c/0x11c [ 539.652529][T20829] ? mutex_unlock+0x19/0x40 [ 539.657014][T20829] ? show_regs_print_info+0x12/0x12 [ 539.662189][T20829] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 539.668228][T20829] should_fail+0x6f6/0x860 [ 539.672620][T20829] ? setup_fault_attr+0x3d0/0x3d0 [ 539.677619][T20829] ? _raw_spin_lock+0xa3/0x1b0 [ 539.682354][T20829] ? __kernfs_new_node+0xdb/0x6d0 [ 539.687351][T20829] should_failslab+0x5/0x20 [ 539.691827][T20829] kmem_cache_alloc+0x36/0x290 [ 539.696563][T20829] __kernfs_new_node+0xdb/0x6d0 [ 539.701386][T20829] ? mutex_lock+0xa6/0x110 [ 539.705776][T20829] ? kernfs_new_node+0x160/0x160 [ 539.710687][T20829] ? security_kernfs_init_security+0x9a/0xb0 [ 539.716637][T20829] ? kernfs_activate+0x3fc/0x420 [ 539.721547][T20829] kernfs_new_node+0x95/0x160 [ 539.726197][T20829] __kernfs_create_file+0x45/0x260 [ 539.731283][T20829] sysfs_add_file_mode_ns+0x293/0x340 [ 539.736628][T20829] internal_create_group+0x560/0xf10 [ 539.741905][T20829] ? sysfs_create_group+0x20/0x20 [ 539.746903][T20829] sysfs_create_groups+0x5d/0x130 [ 539.751902][T20829] device_add+0xae5/0x18a0 [ 539.756292][T20829] ? get_device+0x30/0x30 [ 539.760596][T20829] ? virtual_device_parent+0x50/0x50 [ 539.765851][T20829] ? pm_runtime_init+0x206/0x320 [ 539.770763][T20829] ? device_initialize+0x1d3/0x3e0 [ 539.775848][T20829] netdev_register_kobject+0x178/0x310 [ 539.781282][T20829] ? raw_notifier_call_chain+0xf2/0x110 [ 539.786802][T20829] register_netdevice+0xbc7/0x1480 [ 539.791890][T20829] ? netdev_update_lockdep_key+0x10/0x10 [ 539.797498][T20829] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 539.802495][T20829] ? __rcu_read_lock+0x50/0x50 [ 539.807230][T20829] ? alloc_netdev_mqs+0xa0c/0xc60 [ 539.812227][T20829] ? vti6_locate+0x551/0x910 [ 539.816789][T20829] vti6_locate+0x610/0x910 [ 539.821198][T20829] ? cap_capable+0x23f/0x280 [ 539.825761][T20829] ? vti6_link_config+0x530/0x530 [ 539.830758][T20829] ? vti6_ioctl+0xa64/0x1b10 [ 539.835322][T20829] vti6_ioctl+0xa88/0x1b10 [ 539.839717][T20829] ? vti6_tnl_xmit+0x1720/0x1720 [ 539.844637][T20829] ? __rcu_read_lock+0x50/0x50 [ 539.849377][T20829] ? check_preemption_disabled+0x154/0x330 [ 539.855164][T20829] ? avc_has_extended_perms+0xb5e/0x1140 [ 539.860771][T20829] ? full_name_hash+0xb4/0xe0 [ 539.865439][T20829] dev_ifsioc+0x675/0xa70 [ 539.869743][T20829] ? mutex_lock+0xa6/0x110 [ 539.874132][T20829] ? dev_ioctl+0xab0/0xab0 [ 539.878520][T20829] dev_ioctl+0x558/0xab0 [ 539.882739][T20829] sock_ioctl+0x677/0x760 [ 539.887043][T20829] ? sock_poll+0x2f0/0x2f0 [ 539.891432][T20829] ? memset+0x1f/0x40 [ 539.895386][T20829] ? fsnotify+0x1332/0x13f0 [ 539.899878][T20829] ? sock_poll+0x2f0/0x2f0 [ 539.904290][T20829] do_vfs_ioctl+0x76a/0x1720 [ 539.908860][T20829] ? selinux_file_ioctl+0x72f/0x990 [ 539.914035][T20829] ? ioctl_preallocate+0x250/0x250 [ 539.919142][T20829] ? __fget+0x37b/0x3c0 [ 539.923283][T20829] ? vfs_write+0x422/0x4e0 [ 539.927678][T20829] ? fget_many+0x20/0x20 [ 539.931903][T20829] ? debug_smp_processor_id+0x20/0x20 [ 539.937247][T20829] ? security_file_ioctl+0x9d/0xb0 [ 539.942329][T20829] __x64_sys_ioctl+0xd4/0x110 [ 539.946978][T20829] do_syscall_64+0xcb/0x1e0 [ 539.951456][T20829] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 539.957319][T20829] RIP: 0033:0x466459 [ 539.961204][T20829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 539.980780][T20829] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 539.989176][T20829] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 539.997123][T20829] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 540.005066][T20829] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 21:32:25 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x9000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:25 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x12], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:25 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xa000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:25 executing program 0 (fault-call:8 fault-nth:60): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 540.013010][T20829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 540.020955][T20829] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 540.041362][T20837] EXT4-fs (loop1): Can't read superblock on 2nd try [ 540.061245][T20842] x_tables: duplicate underflow at hook 2 21:32:25 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x2300}, @mcast2}}) 21:32:25 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xb000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x25], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 540.068985][T20815] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 540.113016][T20851] x_tables: duplicate underflow at hook 2 [ 540.117444][T20852] FAULT_INJECTION: forcing a failure. [ 540.117444][T20852] name failslab, interval 1, probability 0, space 0, times 0 [ 540.131794][T20852] CPU: 1 PID: 20852 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 540.142022][T20852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.152069][T20852] Call Trace: [ 540.155365][T20852] dump_stack+0x1d8/0x24e 21:32:25 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xc000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x48], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 540.159697][T20852] ? devkmsg_release+0x11c/0x11c [ 540.164634][T20852] ? mutex_unlock+0x19/0x40 [ 540.169147][T20852] ? show_regs_print_info+0x12/0x12 [ 540.176698][T20852] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 540.178280][T20858] x_tables: duplicate underflow at hook 2 [ 540.182765][T20852] should_fail+0x6f6/0x860 [ 540.182775][T20852] ? setup_fault_attr+0x3d0/0x3d0 [ 540.182786][T20852] ? _raw_spin_lock+0xa3/0x1b0 [ 540.182796][T20852] ? __kernfs_new_node+0xdb/0x6d0 [ 540.182813][T20852] should_failslab+0x5/0x20 [ 540.212191][T20852] kmem_cache_alloc+0x36/0x290 [ 540.216964][T20852] __kernfs_new_node+0xdb/0x6d0 [ 540.221794][T20852] ? mutex_lock+0xa6/0x110 [ 540.226189][T20852] ? kernfs_new_node+0x160/0x160 [ 540.231102][T20852] ? security_kernfs_init_security+0x9a/0xb0 [ 540.237056][T20852] ? kernfs_activate+0x3fc/0x420 [ 540.241966][T20852] kernfs_new_node+0x95/0x160 [ 540.246617][T20852] __kernfs_create_file+0x45/0x260 [ 540.251702][T20852] sysfs_add_file_mode_ns+0x293/0x340 [ 540.257048][T20852] internal_create_group+0x560/0xf10 [ 540.262307][T20852] ? sysfs_create_group+0x20/0x20 [ 540.267304][T20852] sysfs_create_groups+0x5d/0x130 [ 540.272306][T20852] device_add+0xae5/0x18a0 [ 540.276696][T20852] ? get_device+0x30/0x30 [ 540.280999][T20852] ? virtual_device_parent+0x50/0x50 [ 540.286273][T20852] ? pm_runtime_init+0x206/0x320 [ 540.291183][T20852] ? device_initialize+0x1d3/0x3e0 [ 540.296272][T20852] netdev_register_kobject+0x178/0x310 [ 540.301705][T20852] ? raw_notifier_call_chain+0xf2/0x110 [ 540.307223][T20852] register_netdevice+0xbc7/0x1480 [ 540.312308][T20852] ? netdev_update_lockdep_key+0x10/0x10 [ 540.317935][T20852] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 540.322933][T20852] ? __rcu_read_lock+0x50/0x50 [ 540.327669][T20852] ? alloc_netdev_mqs+0xa0c/0xc60 [ 540.332665][T20852] ? vti6_locate+0x551/0x910 [ 540.337244][T20852] vti6_locate+0x610/0x910 [ 540.341654][T20852] ? cap_capable+0x23f/0x280 [ 540.346225][T20852] ? vti6_link_config+0x530/0x530 [ 540.351236][T20852] ? vti6_ioctl+0xa64/0x1b10 [ 540.355801][T20852] vti6_ioctl+0xa88/0x1b10 [ 540.360191][T20852] ? vti6_tnl_xmit+0x1720/0x1720 [ 540.365102][T20852] ? __rcu_read_unlock+0x1cd/0x6a0 [ 540.370189][T20852] ? __rcu_read_lock+0x50/0x50 [ 540.374924][T20852] ? avc_has_extended_perms+0xb5e/0x1140 [ 540.380528][T20852] ? full_name_hash+0xb4/0xe0 [ 540.385178][T20852] dev_ifsioc+0x675/0xa70 [ 540.389481][T20852] ? mutex_lock+0xa6/0x110 [ 540.393869][T20852] ? dev_ioctl+0xab0/0xab0 [ 540.398268][T20852] dev_ioctl+0x558/0xab0 [ 540.402484][T20852] sock_ioctl+0x677/0x760 [ 540.406786][T20852] ? sock_poll+0x2f0/0x2f0 [ 540.411174][T20852] ? memset+0x1f/0x40 [ 540.415129][T20852] ? fsnotify+0x1332/0x13f0 [ 540.419606][T20852] ? sock_poll+0x2f0/0x2f0 [ 540.423996][T20852] do_vfs_ioctl+0x76a/0x1720 [ 540.428556][T20852] ? selinux_file_ioctl+0x72f/0x990 [ 540.433727][T20852] ? ioctl_preallocate+0x250/0x250 [ 540.438815][T20852] ? __fget+0x37b/0x3c0 [ 540.442945][T20852] ? vfs_write+0x422/0x4e0 [ 540.447337][T20852] ? fget_many+0x20/0x20 [ 540.451552][T20852] ? debug_smp_processor_id+0x20/0x20 [ 540.456895][T20852] ? security_file_ioctl+0x9d/0xb0 [ 540.461978][T20852] __x64_sys_ioctl+0xd4/0x110 [ 540.466631][T20852] do_syscall_64+0xcb/0x1e0 [ 540.471109][T20852] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 540.476971][T20852] RIP: 0033:0x466459 [ 540.480839][T20852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 540.500415][T20852] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 540.508800][T20852] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 540.516746][T20852] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 540.524691][T20852] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 540.532636][T20852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 540.540599][T20852] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000190fff00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:25 executing program 0 (fault-call:8 fault-nth:61): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:25 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xd000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 540.569781][T20859] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 540.573632][T20868] x_tables: duplicate underflow at hook 2 [ 540.584274][T20837] EXT4-fs (loop1): Can't read superblock on 2nd try [ 540.619980][T20871] FAULT_INJECTION: forcing a failure. [ 540.619980][T20871] name failslab, interval 1, probability 0, space 0, times 0 [ 540.632964][T20871] CPU: 1 PID: 20871 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 540.643192][T20871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.653242][T20871] Call Trace: [ 540.656541][T20871] dump_stack+0x1d8/0x24e [ 540.660874][T20871] ? devkmsg_release+0x11c/0x11c [ 540.665832][T20871] ? mutex_unlock+0x19/0x40 [ 540.670357][T20871] ? show_regs_print_info+0x12/0x12 [ 540.675657][T20871] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 540.681848][T20871] should_fail+0x6f6/0x860 [ 540.686249][T20871] ? setup_fault_attr+0x3d0/0x3d0 [ 540.691252][T20871] ? _raw_spin_lock+0xa3/0x1b0 [ 540.695992][T20871] ? __kernfs_new_node+0xdb/0x6d0 [ 540.700991][T20871] should_failslab+0x5/0x20 [ 540.705474][T20871] kmem_cache_alloc+0x36/0x290 [ 540.710283][T20871] __kernfs_new_node+0xdb/0x6d0 [ 540.715219][T20871] ? mutex_lock+0xa6/0x110 [ 540.719614][T20871] ? kernfs_new_node+0x160/0x160 [ 540.724526][T20871] ? security_kernfs_init_security+0x9a/0xb0 [ 540.730482][T20871] ? kernfs_activate+0x3fc/0x420 [ 540.735398][T20871] kernfs_new_node+0x95/0x160 [ 540.740053][T20871] __kernfs_create_file+0x45/0x260 [ 540.745141][T20871] sysfs_add_file_mode_ns+0x293/0x340 [ 540.750493][T20871] internal_create_group+0x560/0xf10 [ 540.755764][T20871] ? sysfs_create_group+0x20/0x20 [ 540.760763][T20871] sysfs_create_groups+0x5d/0x130 [ 540.765762][T20871] device_add+0xae5/0x18a0 [ 540.770159][T20871] ? get_device+0x30/0x30 [ 540.774462][T20871] ? virtual_device_parent+0x50/0x50 [ 540.779718][T20871] ? pm_runtime_init+0x206/0x320 [ 540.784644][T20871] ? device_initialize+0x1d3/0x3e0 [ 540.789742][T20871] netdev_register_kobject+0x178/0x310 [ 540.795180][T20871] ? raw_notifier_call_chain+0xf2/0x110 [ 540.800708][T20871] register_netdevice+0xbc7/0x1480 [ 540.805796][T20871] ? netdev_update_lockdep_key+0x10/0x10 [ 540.811404][T20871] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 540.816402][T20871] ? __rcu_read_lock+0x50/0x50 [ 540.821139][T20871] ? alloc_netdev_mqs+0xa0c/0xc60 [ 540.826152][T20871] ? vti6_locate+0x551/0x910 [ 540.830819][T20871] vti6_locate+0x610/0x910 [ 540.835213][T20871] ? cap_capable+0x23f/0x280 [ 540.839784][T20871] ? vti6_link_config+0x530/0x530 [ 540.844785][T20871] ? vti6_ioctl+0xa64/0x1b10 [ 540.849352][T20871] vti6_ioctl+0xa88/0x1b10 [ 540.853761][T20871] ? vti6_tnl_xmit+0x1720/0x1720 [ 540.858792][T20871] ? __rcu_read_lock+0x50/0x50 [ 540.863554][T20871] ? check_preemption_disabled+0x154/0x330 [ 540.869534][T20871] ? avc_has_extended_perms+0xb5e/0x1140 [ 540.875142][T20871] ? full_name_hash+0xb4/0xe0 [ 540.879888][T20871] dev_ifsioc+0x675/0xa70 [ 540.884194][T20871] ? mutex_lock+0xa6/0x110 [ 540.888585][T20871] ? dev_ioctl+0xab0/0xab0 [ 540.892986][T20871] dev_ioctl+0x558/0xab0 [ 540.897268][T20871] sock_ioctl+0x677/0x760 [ 540.901585][T20871] ? sock_poll+0x2f0/0x2f0 [ 540.905985][T20871] ? memset+0x1f/0x40 [ 540.909946][T20871] ? fsnotify+0x1332/0x13f0 [ 540.914430][T20871] ? sock_poll+0x2f0/0x2f0 [ 540.918838][T20871] do_vfs_ioctl+0x76a/0x1720 [ 540.923413][T20871] ? selinux_file_ioctl+0x72f/0x990 [ 540.928668][T20871] ? ioctl_preallocate+0x250/0x250 [ 540.933777][T20871] ? __fget+0x37b/0x3c0 [ 540.937941][T20871] ? vfs_write+0x422/0x4e0 [ 540.942333][T20871] ? fget_many+0x20/0x20 [ 540.946556][T20871] ? debug_smp_processor_id+0x20/0x20 [ 540.951905][T20871] ? security_file_ioctl+0x9d/0xb0 [ 540.957016][T20871] __x64_sys_ioctl+0xd4/0x110 [ 540.961671][T20871] do_syscall_64+0xcb/0x1e0 [ 540.966152][T20871] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 540.972025][T20871] RIP: 0033:0x466459 [ 540.975892][T20871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 540.996604][T20871] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 541.004993][T20871] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 541.014189][T20871] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 541.022232][T20871] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 541.030189][T20871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 541.038136][T20871] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:26 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:26 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x2d00}, @mcast2}}) 21:32:26 executing program 0 (fault-call:8 fault-nth:62): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:26 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xe000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 541.179827][T20880] FAULT_INJECTION: forcing a failure. [ 541.179827][T20880] name failslab, interval 1, probability 0, space 0, times 0 [ 541.200840][T20887] x_tables: duplicate underflow at hook 2 [ 541.201877][T20880] CPU: 0 PID: 20880 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 541.216823][T20880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.226872][T20880] Call Trace: [ 541.230161][T20880] dump_stack+0x1d8/0x24e [ 541.234479][T20880] ? devkmsg_release+0x11c/0x11c [ 541.239439][T20880] ? mutex_unlock+0x19/0x40 [ 541.243922][T20880] ? show_regs_print_info+0x12/0x12 [ 541.249099][T20880] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 541.255285][T20880] should_fail+0x6f6/0x860 [ 541.259685][T20880] ? setup_fault_attr+0x3d0/0x3d0 [ 541.264687][T20880] ? _raw_spin_lock+0xa3/0x1b0 [ 541.269430][T20880] ? __kernfs_new_node+0xdb/0x6d0 [ 541.274429][T20880] should_failslab+0x5/0x20 [ 541.278924][T20880] kmem_cache_alloc+0x36/0x290 [ 541.283670][T20880] __kernfs_new_node+0xdb/0x6d0 [ 541.288494][T20880] ? mutex_lock+0xa6/0x110 [ 541.292900][T20880] ? kernfs_new_node+0x160/0x160 [ 541.298939][T20880] ? security_kernfs_init_security+0x9a/0xb0 [ 541.304913][T20880] ? kernfs_activate+0x3fc/0x420 [ 541.309823][T20880] kernfs_new_node+0x95/0x160 [ 541.314476][T20880] __kernfs_create_file+0x45/0x260 [ 541.319563][T20880] sysfs_add_file_mode_ns+0x293/0x340 [ 541.324906][T20880] internal_create_group+0x560/0xf10 [ 541.330167][T20880] ? sysfs_create_group+0x20/0x20 [ 541.335166][T20880] sysfs_create_groups+0x5d/0x130 [ 541.340171][T20880] device_add+0xae5/0x18a0 [ 541.344582][T20880] ? get_device+0x30/0x30 [ 541.348883][T20880] ? virtual_device_parent+0x50/0x50 [ 541.354155][T20880] ? pm_runtime_init+0x206/0x320 [ 541.359064][T20880] ? device_initialize+0x1d3/0x3e0 [ 541.364153][T20880] netdev_register_kobject+0x178/0x310 [ 541.369585][T20880] ? raw_notifier_call_chain+0xf2/0x110 [ 541.375107][T20880] register_netdevice+0xbc7/0x1480 [ 541.380191][T20880] ? netdev_update_lockdep_key+0x10/0x10 [ 541.385795][T20880] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 541.390792][T20880] ? __rcu_read_lock+0x50/0x50 [ 541.395526][T20880] ? alloc_netdev_mqs+0xa0c/0xc60 [ 541.400541][T20880] ? vti6_locate+0x551/0x910 [ 541.405100][T20880] vti6_locate+0x610/0x910 [ 541.409490][T20880] ? cap_capable+0x23f/0x280 [ 541.414051][T20880] ? vti6_link_config+0x530/0x530 [ 541.419048][T20880] ? vti6_ioctl+0xa64/0x1b10 [ 541.423632][T20880] vti6_ioctl+0xa88/0x1b10 [ 541.428024][T20880] ? vti6_tnl_xmit+0x1720/0x1720 [ 541.432935][T20880] ? __rcu_read_lock+0x50/0x50 [ 541.437675][T20880] ? check_preemption_disabled+0x154/0x330 [ 541.443455][T20880] ? avc_has_extended_perms+0xb5e/0x1140 [ 541.449059][T20880] ? full_name_hash+0xb4/0xe0 [ 541.456926][T20880] dev_ifsioc+0x675/0xa70 [ 541.461228][T20880] ? mutex_lock+0xa6/0x110 [ 541.465616][T20880] ? dev_ioctl+0xab0/0xab0 [ 541.470002][T20880] dev_ioctl+0x558/0xab0 [ 541.474218][T20880] sock_ioctl+0x677/0x760 [ 541.478518][T20880] ? sock_poll+0x2f0/0x2f0 [ 541.482905][T20880] ? memset+0x1f/0x40 [ 541.486859][T20880] ? fsnotify+0x1332/0x13f0 [ 541.491335][T20880] ? sock_poll+0x2f0/0x2f0 [ 541.495727][T20880] do_vfs_ioctl+0x76a/0x1720 [ 541.500313][T20880] ? selinux_file_ioctl+0x72f/0x990 [ 541.505488][T20880] ? ioctl_preallocate+0x250/0x250 [ 541.510581][T20880] ? __fget+0x37b/0x3c0 [ 541.514708][T20880] ? vfs_write+0x422/0x4e0 [ 541.519096][T20880] ? fget_many+0x20/0x20 [ 541.523314][T20880] ? debug_smp_processor_id+0x20/0x20 [ 541.528661][T20880] ? security_file_ioctl+0x9d/0xb0 [ 541.533747][T20880] __x64_sys_ioctl+0xd4/0x110 [ 541.538408][T20880] do_syscall_64+0xcb/0x1e0 [ 541.542883][T20880] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 541.548749][T20880] RIP: 0033:0x466459 [ 541.552618][T20880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 541.572194][T20880] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:32:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x60], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:26 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x10000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:26 executing program 0 (fault-call:8 fault-nth:63): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000200900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 541.580575][T20880] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 541.588538][T20880] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 541.596484][T20880] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 541.604433][T20880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 541.612469][T20880] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x68], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 541.641684][T20888] EXT4-fs (loop1): Can't read superblock on 2nd try [ 541.657956][T20898] x_tables: duplicate underflow at hook 2 [ 541.668610][T20899] secmark_tg_check: 17 callbacks suppressed [ 541.668615][T20899] xt_SECMARK: invalid mode: 0 [ 541.670740][T20886] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 541.691507][T20901] FAULT_INJECTION: forcing a failure. [ 541.691507][T20901] name failslab, interval 1, probability 0, space 0, times 0 [ 541.694145][T20904] xt_SECMARK: invalid mode: 0 [ 541.705758][T20901] CPU: 1 PID: 20901 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 541.719073][T20901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.729112][T20901] Call Trace: [ 541.732388][T20901] dump_stack+0x1d8/0x24e [ 541.736697][T20901] ? devkmsg_release+0x11c/0x11c [ 541.741682][T20901] ? mutex_unlock+0x19/0x40 [ 541.746169][T20901] ? show_regs_print_info+0x12/0x12 [ 541.751501][T20901] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 541.757667][T20901] should_fail+0x6f6/0x860 [ 541.762064][T20901] ? setup_fault_attr+0x3d0/0x3d0 [ 541.767066][T20901] ? _raw_spin_lock+0xa3/0x1b0 [ 541.771820][T20901] ? __kernfs_new_node+0xdb/0x6d0 [ 541.776819][T20901] should_failslab+0x5/0x20 [ 541.781306][T20901] kmem_cache_alloc+0x36/0x290 [ 541.786095][T20901] __kernfs_new_node+0xdb/0x6d0 [ 541.790931][T20901] ? mutex_lock+0xa6/0x110 [ 541.795323][T20901] ? kernfs_new_node+0x160/0x160 [ 541.800372][T20901] ? security_kernfs_init_security+0x9a/0xb0 [ 541.806337][T20901] ? kernfs_activate+0x3fc/0x420 [ 541.811363][T20901] kernfs_new_node+0x95/0x160 [ 541.816030][T20901] __kernfs_create_file+0x45/0x260 [ 541.821121][T20901] sysfs_add_file_mode_ns+0x293/0x340 [ 541.826468][T20901] internal_create_group+0x560/0xf10 [ 541.831733][T20901] ? sysfs_create_group+0x20/0x20 [ 541.836732][T20901] sysfs_create_groups+0x5d/0x130 [ 541.841733][T20901] device_add+0xae5/0x18a0 [ 541.846127][T20901] ? get_device+0x30/0x30 [ 541.850429][T20901] ? virtual_device_parent+0x50/0x50 [ 541.855703][T20901] ? pm_runtime_init+0x206/0x320 [ 541.860631][T20901] ? device_initialize+0x1d3/0x3e0 [ 541.865720][T20901] netdev_register_kobject+0x178/0x310 [ 541.871154][T20901] ? raw_notifier_call_chain+0xf2/0x110 [ 541.876681][T20901] register_netdevice+0xbc7/0x1480 [ 541.881774][T20901] ? netdev_update_lockdep_key+0x10/0x10 [ 541.887404][T20901] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 541.892404][T20901] ? __rcu_read_lock+0x50/0x50 [ 541.897165][T20901] ? alloc_netdev_mqs+0xa0c/0xc60 [ 541.902225][T20901] ? vti6_locate+0x551/0x910 [ 541.906794][T20901] vti6_locate+0x610/0x910 [ 541.911189][T20901] ? cap_capable+0x23f/0x280 [ 541.915772][T20901] ? vti6_link_config+0x530/0x530 [ 541.920803][T20901] ? vti6_ioctl+0xa64/0x1b10 [ 541.925384][T20901] vti6_ioctl+0xa88/0x1b10 [ 541.929773][T20901] ? vti6_tnl_xmit+0x1720/0x1720 [ 541.934685][T20901] ? __rcu_read_lock+0x50/0x50 [ 541.939422][T20901] ? check_preemption_disabled+0x154/0x330 [ 541.945203][T20901] ? avc_has_extended_perms+0xb5e/0x1140 [ 541.950811][T20901] ? full_name_hash+0xb4/0xe0 [ 541.955477][T20901] dev_ifsioc+0x675/0xa70 [ 541.959784][T20901] ? mutex_lock+0xa6/0x110 [ 541.964194][T20901] ? dev_ioctl+0xab0/0xab0 [ 541.968594][T20901] dev_ioctl+0x558/0xab0 [ 541.972812][T20901] sock_ioctl+0x677/0x760 [ 541.977112][T20901] ? sock_poll+0x2f0/0x2f0 [ 541.981502][T20901] ? memset+0x1f/0x40 [ 541.985455][T20901] ? fsnotify+0x1332/0x13f0 [ 541.989928][T20901] ? sock_poll+0x2f0/0x2f0 [ 541.994316][T20901] do_vfs_ioctl+0x76a/0x1720 [ 541.998879][T20901] ? selinux_file_ioctl+0x72f/0x990 [ 542.004048][T20901] ? ioctl_preallocate+0x250/0x250 [ 542.009226][T20901] ? __fget+0x37b/0x3c0 [ 542.013371][T20901] ? vfs_write+0x422/0x4e0 [ 542.017762][T20901] ? fget_many+0x20/0x20 [ 542.021996][T20901] ? debug_smp_processor_id+0x20/0x20 [ 542.027450][T20901] ? security_file_ioctl+0x9d/0xb0 [ 542.032552][T20901] __x64_sys_ioctl+0xd4/0x110 [ 542.037213][T20901] do_syscall_64+0xcb/0x1e0 21:32:27 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x11000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 542.041698][T20901] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 542.047570][T20901] RIP: 0033:0x466459 [ 542.051452][T20901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 542.071050][T20901] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 542.079439][T20901] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:27 executing program 0 (fault-call:8 fault-nth:64): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 542.087402][T20901] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 542.095373][T20901] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 542.103333][T20901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 542.111297][T20901] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 542.154129][T20911] xt_SECMARK: invalid mode: 0 [ 542.160606][T20907] FAULT_INJECTION: forcing a failure. [ 542.160606][T20907] name failslab, interval 1, probability 0, space 0, times 0 [ 542.160703][T20912] xt_SECMARK: invalid mode: 0 [ 542.174517][T20907] CPU: 0 PID: 20907 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 542.189324][T20907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.199363][T20907] Call Trace: [ 542.202638][T20907] dump_stack+0x1d8/0x24e [ 542.206955][T20907] ? devkmsg_release+0x11c/0x11c [ 542.211873][T20907] ? mutex_unlock+0x19/0x40 [ 542.216351][T20907] ? show_regs_print_info+0x12/0x12 [ 542.221523][T20907] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 542.227567][T20907] should_fail+0x6f6/0x860 [ 542.231973][T20907] ? setup_fault_attr+0x3d0/0x3d0 [ 542.236970][T20907] ? _raw_spin_lock+0xa3/0x1b0 [ 542.241712][T20907] ? __kernfs_new_node+0xdb/0x6d0 [ 542.246718][T20907] should_failslab+0x5/0x20 [ 542.251192][T20907] kmem_cache_alloc+0x36/0x290 [ 542.255928][T20907] __kernfs_new_node+0xdb/0x6d0 [ 542.260753][T20907] ? mutex_lock+0xa6/0x110 [ 542.265143][T20907] ? kernfs_new_node+0x160/0x160 [ 542.270065][T20907] ? kernfs_activate+0x3fc/0x420 [ 542.274979][T20907] kernfs_new_node+0x95/0x160 [ 542.279631][T20907] __kernfs_create_file+0x45/0x260 [ 542.284716][T20907] sysfs_add_file_mode_ns+0x293/0x340 [ 542.290063][T20907] internal_create_group+0x560/0xf10 [ 542.295340][T20907] ? sysfs_create_group+0x20/0x20 [ 542.300339][T20907] sysfs_create_groups+0x5d/0x130 [ 542.305359][T20907] device_add+0xae5/0x18a0 [ 542.309751][T20907] ? get_device+0x30/0x30 [ 542.314050][T20907] ? virtual_device_parent+0x50/0x50 [ 542.319309][T20907] ? pm_runtime_init+0x206/0x320 [ 542.324240][T20907] ? device_initialize+0x1d3/0x3e0 [ 542.329328][T20907] netdev_register_kobject+0x178/0x310 [ 542.334778][T20907] ? raw_notifier_call_chain+0xf2/0x110 [ 542.340300][T20907] register_netdevice+0xbc7/0x1480 [ 542.345385][T20907] ? netdev_update_lockdep_key+0x10/0x10 [ 542.350992][T20907] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 542.355991][T20907] ? __rcu_read_lock+0x50/0x50 [ 542.360729][T20907] ? alloc_netdev_mqs+0xa0c/0xc60 [ 542.365737][T20907] ? vti6_locate+0x551/0x910 [ 542.370308][T20907] vti6_locate+0x610/0x910 [ 542.374710][T20907] ? cap_capable+0x23f/0x280 [ 542.379274][T20907] ? vti6_link_config+0x530/0x530 [ 542.384272][T20907] ? vti6_ioctl+0xa64/0x1b10 [ 542.388833][T20907] vti6_ioctl+0xa88/0x1b10 [ 542.393226][T20907] ? vti6_tnl_xmit+0x1720/0x1720 [ 542.398138][T20907] ? __rcu_read_lock+0x50/0x50 [ 542.402883][T20907] ? check_preemption_disabled+0x154/0x330 [ 542.408885][T20907] ? avc_has_extended_perms+0xb5e/0x1140 [ 542.414501][T20907] ? full_name_hash+0xb4/0xe0 [ 542.419207][T20907] dev_ifsioc+0x675/0xa70 [ 542.423523][T20907] ? mutex_lock+0xa6/0x110 [ 542.427913][T20907] ? dev_ioctl+0xab0/0xab0 [ 542.432305][T20907] dev_ioctl+0x558/0xab0 [ 542.436571][T20907] sock_ioctl+0x677/0x760 [ 542.440987][T20907] ? sock_poll+0x2f0/0x2f0 [ 542.445376][T20907] ? memset+0x1f/0x40 [ 542.449331][T20907] ? fsnotify+0x1332/0x13f0 [ 542.453806][T20907] ? sock_poll+0x2f0/0x2f0 [ 542.458203][T20907] do_vfs_ioctl+0x76a/0x1720 [ 542.462772][T20907] ? selinux_file_ioctl+0x72f/0x990 [ 542.467960][T20907] ? ioctl_preallocate+0x250/0x250 [ 542.473053][T20907] ? __fget+0x37b/0x3c0 [ 542.477182][T20907] ? vfs_write+0x422/0x4e0 [ 542.481573][T20907] ? fget_many+0x20/0x20 [ 542.485793][T20907] ? debug_smp_processor_id+0x20/0x20 [ 542.491156][T20907] ? security_file_ioctl+0x9d/0xb0 [ 542.496254][T20907] __x64_sys_ioctl+0xd4/0x110 [ 542.500913][T20907] do_syscall_64+0xcb/0x1e0 [ 542.505511][T20907] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 542.511391][T20907] RIP: 0033:0x466459 [ 542.515262][T20907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 542.534881][T20907] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 542.543271][T20907] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:27 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:27 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x3300}, @mcast2}}) 21:32:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:27 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x12000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:27 executing program 0 (fault-call:8 fault-nth:65): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 542.551218][T20907] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 542.559168][T20907] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 542.567120][T20907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 542.575066][T20907] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 542.586154][T20903] EXT4-fs (loop1): Can't read superblock on 2nd try [ 542.621466][T20920] xt_SECMARK: invalid mode: 0 [ 542.635778][T20924] FAULT_INJECTION: forcing a failure. [ 542.635778][T20924] name failslab, interval 1, probability 0, space 0, times 0 [ 542.637246][T20923] xt_SECMARK: invalid mode: 0 [ 542.648517][T20924] CPU: 0 PID: 20924 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 542.663420][T20924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.673477][T20924] Call Trace: [ 542.676760][T20924] dump_stack+0x1d8/0x24e [ 542.681072][T20924] ? devkmsg_release+0x11c/0x11c [ 542.685985][T20924] ? mutex_unlock+0x19/0x40 [ 542.690459][T20924] ? show_regs_print_info+0x12/0x12 [ 542.695628][T20924] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 542.701754][T20924] should_fail+0x6f6/0x860 [ 542.706140][T20924] ? setup_fault_attr+0x3d0/0x3d0 [ 542.711136][T20924] ? _raw_spin_lock+0xa3/0x1b0 [ 542.715876][T20924] ? __kernfs_new_node+0xdb/0x6d0 [ 542.720870][T20924] should_failslab+0x5/0x20 [ 542.725361][T20924] kmem_cache_alloc+0x36/0x290 [ 542.730112][T20924] __kernfs_new_node+0xdb/0x6d0 [ 542.734936][T20924] ? mutex_lock+0xa6/0x110 [ 542.739339][T20924] ? kernfs_new_node+0x160/0x160 [ 542.744248][T20924] ? security_kernfs_init_security+0x9a/0xb0 [ 542.750200][T20924] ? kernfs_activate+0x3fc/0x420 [ 542.755109][T20924] kernfs_new_node+0x95/0x160 [ 542.759757][T20924] __kernfs_create_file+0x45/0x260 [ 542.764841][T20924] sysfs_add_file_mode_ns+0x293/0x340 [ 542.770188][T20924] internal_create_group+0x560/0xf10 [ 542.775445][T20924] ? sysfs_create_group+0x20/0x20 [ 542.780440][T20924] sysfs_create_groups+0x5d/0x130 [ 542.786392][T20924] device_add+0xae5/0x18a0 [ 542.790796][T20924] ? get_device+0x30/0x30 [ 542.795097][T20924] ? virtual_device_parent+0x50/0x50 [ 542.800351][T20924] ? pm_runtime_init+0x206/0x320 [ 542.805260][T20924] ? device_initialize+0x1d3/0x3e0 [ 542.810344][T20924] netdev_register_kobject+0x178/0x310 [ 542.815791][T20924] ? raw_notifier_call_chain+0xf2/0x110 [ 542.821308][T20924] register_netdevice+0xbc7/0x1480 [ 542.826392][T20924] ? netdev_update_lockdep_key+0x10/0x10 [ 542.831994][T20924] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 542.836988][T20924] ? __rcu_read_lock+0x50/0x50 [ 542.841912][T20924] ? alloc_netdev_mqs+0xa0c/0xc60 [ 542.846907][T20924] ? vti6_locate+0x551/0x910 [ 542.851468][T20924] vti6_locate+0x610/0x910 [ 542.855857][T20924] ? cap_capable+0x23f/0x280 [ 542.860421][T20924] ? vti6_link_config+0x530/0x530 [ 542.865416][T20924] ? vti6_ioctl+0xa64/0x1b10 [ 542.869976][T20924] vti6_ioctl+0xa88/0x1b10 [ 542.874367][T20924] ? vti6_tnl_xmit+0x1720/0x1720 [ 542.879275][T20924] ? __perf_event_task_sched_in+0x57c/0x5e0 [ 542.885137][T20924] ? __rcu_read_lock+0x50/0x50 [ 542.889893][T20924] ? switch_mm_irqs_off+0x72f/0x9a0 [ 542.895076][T20924] ? avc_has_extended_perms+0xb5e/0x1140 [ 542.900685][T20924] ? full_name_hash+0xb4/0xe0 [ 542.905339][T20924] dev_ifsioc+0x675/0xa70 [ 542.909646][T20924] ? mutex_lock+0xa6/0x110 [ 542.914057][T20924] ? dev_ioctl+0xab0/0xab0 [ 542.918458][T20924] dev_ioctl+0x558/0xab0 [ 542.922679][T20924] sock_ioctl+0x677/0x760 [ 542.926982][T20924] ? sock_poll+0x2f0/0x2f0 [ 542.931375][T20924] ? sock_poll+0x2f0/0x2f0 [ 542.935766][T20924] do_vfs_ioctl+0x76a/0x1720 [ 542.940335][T20924] ? selinux_file_ioctl+0x72f/0x990 [ 542.945508][T20924] ? ioctl_preallocate+0x250/0x250 [ 542.950594][T20924] ? __fget+0x37b/0x3c0 [ 542.954737][T20924] ? vfs_write+0x422/0x4e0 [ 542.959127][T20924] ? fget_many+0x20/0x20 [ 542.963344][T20924] ? debug_smp_processor_id+0x20/0x20 [ 542.968706][T20924] ? security_file_ioctl+0x9d/0xb0 [ 542.973790][T20924] __x64_sys_ioctl+0xd4/0x110 [ 542.978441][T20924] do_syscall_64+0xcb/0x1e0 [ 542.982923][T20924] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 542.988789][T20924] RIP: 0033:0x466459 [ 542.992655][T20924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 543.012234][T20924] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:32:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x74], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:28 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x14010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:28 executing program 0 (fault-call:8 fault-nth:66): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000300900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:28 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x21000}, @mcast2}}) [ 543.020615][T20924] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 543.028559][T20924] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 543.036511][T20924] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 543.044468][T20924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 543.052421][T20924] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 543.098252][T20919] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 543.114768][T20929] FAULT_INJECTION: forcing a failure. [ 543.114768][T20929] name failslab, interval 1, probability 0, space 0, times 0 [ 543.124064][T20932] xt_check_table_hooks: 2 callbacks suppressed [ 543.124069][T20932] x_tables: duplicate underflow at hook 2 [ 543.133165][T20929] CPU: 0 PID: 20929 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 543.142154][T20935] xt_SECMARK: invalid mode: 0 [ 543.149545][T20929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.149548][T20929] Call Trace: [ 543.149568][T20929] dump_stack+0x1d8/0x24e [ 543.149587][T20929] ? devkmsg_release+0x11c/0x11c [ 543.156091][T20938] xt_SECMARK: invalid mode: 0 [ 543.164295][T20929] ? mutex_unlock+0x19/0x40 [ 543.164307][T20929] ? show_regs_print_info+0x12/0x12 [ 543.164317][T20929] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 543.164327][T20929] should_fail+0x6f6/0x860 [ 543.164342][T20929] ? setup_fault_attr+0x3d0/0x3d0 [ 543.206688][T20929] ? _raw_spin_lock+0xa3/0x1b0 [ 543.211427][T20929] ? __kernfs_new_node+0xdb/0x6d0 [ 543.216426][T20929] should_failslab+0x5/0x20 [ 543.220902][T20929] kmem_cache_alloc+0x36/0x290 [ 543.225637][T20929] __kernfs_new_node+0xdb/0x6d0 [ 543.230457][T20929] ? mutex_lock+0xa6/0x110 [ 543.234840][T20929] ? kernfs_new_node+0x160/0x160 [ 543.239748][T20929] ? kernfs_activate+0x3fc/0x420 [ 543.244652][T20929] kernfs_new_node+0x95/0x160 [ 543.249298][T20929] __kernfs_create_file+0x45/0x260 [ 543.254396][T20929] sysfs_add_file_mode_ns+0x293/0x340 [ 543.259742][T20929] internal_create_group+0x560/0xf10 [ 543.264997][T20929] ? sysfs_create_group+0x20/0x20 [ 543.270009][T20929] sysfs_create_groups+0x5d/0x130 [ 543.275001][T20929] device_add+0xae5/0x18a0 [ 543.279394][T20929] ? get_device+0x30/0x30 [ 543.283702][T20929] ? virtual_device_parent+0x50/0x50 [ 543.288970][T20929] ? pm_runtime_init+0x206/0x320 [ 543.295805][T20929] ? device_initialize+0x1d3/0x3e0 [ 543.300886][T20929] netdev_register_kobject+0x178/0x310 [ 543.306316][T20929] ? raw_notifier_call_chain+0xf2/0x110 [ 543.311834][T20929] register_netdevice+0xbc7/0x1480 [ 543.316916][T20929] ? netdev_update_lockdep_key+0x10/0x10 [ 543.322537][T20929] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 543.327549][T20929] ? __rcu_read_lock+0x50/0x50 [ 543.332284][T20929] ? alloc_netdev_mqs+0xa0c/0xc60 [ 543.337277][T20929] ? vti6_locate+0x551/0x910 [ 543.341883][T20929] vti6_locate+0x610/0x910 [ 543.346329][T20929] ? cap_capable+0x23f/0x280 [ 543.350899][T20929] ? vti6_link_config+0x530/0x530 [ 543.355950][T20929] ? vti6_ioctl+0xa64/0x1b10 [ 543.360518][T20929] vti6_ioctl+0xa88/0x1b10 [ 543.364908][T20929] ? vti6_tnl_xmit+0x1720/0x1720 [ 543.369835][T20929] ? __rcu_read_lock+0x50/0x50 [ 543.374589][T20929] ? check_preemption_disabled+0x154/0x330 [ 543.380367][T20929] ? avc_has_extended_perms+0xb5e/0x1140 [ 543.385986][T20929] ? full_name_hash+0xb4/0xe0 [ 543.390634][T20929] dev_ifsioc+0x675/0xa70 [ 543.394935][T20929] ? mutex_lock+0xa6/0x110 [ 543.399328][T20929] ? dev_ioctl+0xab0/0xab0 [ 543.403712][T20929] dev_ioctl+0x558/0xab0 [ 543.407925][T20929] sock_ioctl+0x677/0x760 [ 543.412226][T20929] ? sock_poll+0x2f0/0x2f0 [ 543.416628][T20929] ? memset+0x1f/0x40 [ 543.420582][T20929] ? fsnotify+0x1332/0x13f0 [ 543.425055][T20929] ? sock_poll+0x2f0/0x2f0 [ 543.429441][T20929] do_vfs_ioctl+0x76a/0x1720 [ 543.434004][T20929] ? selinux_file_ioctl+0x72f/0x990 [ 543.439197][T20929] ? ioctl_preallocate+0x250/0x250 [ 543.444299][T20929] ? __fget+0x37b/0x3c0 [ 543.448428][T20929] ? vfs_write+0x422/0x4e0 [ 543.452812][T20929] ? fget_many+0x20/0x20 [ 543.457024][T20929] ? debug_smp_processor_id+0x20/0x20 [ 543.462384][T20929] ? security_file_ioctl+0x9d/0xb0 [ 543.467465][T20929] __x64_sys_ioctl+0xd4/0x110 [ 543.472134][T20929] do_syscall_64+0xcb/0x1e0 [ 543.476610][T20929] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 543.482473][T20929] RIP: 0033:0x466459 21:32:28 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x20000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7a], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:28 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) [ 543.486339][T20929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 543.505913][T20929] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 543.514296][T20929] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 543.522238][T20929] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 543.532021][T20929] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 543.539980][T20929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 21:32:28 executing program 0 (fault-call:8 fault-nth:67): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 543.547944][T20929] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 543.587388][T20936] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x1f8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 543.602995][T20947] FAULT_INJECTION: forcing a failure. [ 543.602995][T20947] name failslab, interval 1, probability 0, space 0, times 0 [ 543.604693][T20950] x_tables: duplicate underflow at hook 2 [ 543.616876][T20947] CPU: 0 PID: 20947 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 543.631406][T20948] xt_SECMARK: invalid mode: 0 [ 543.631588][T20947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.631592][T20947] Call Trace: [ 543.631618][T20947] dump_stack+0x1d8/0x24e [ 543.638744][T20951] xt_SECMARK: invalid mode: 0 [ 543.646322][T20947] ? devkmsg_release+0x11c/0x11c [ 543.646335][T20947] ? show_regs_print_info+0x12/0x12 [ 543.646346][T20947] should_fail+0x6f6/0x860 [ 543.646354][T20947] ? setup_fault_attr+0x3d0/0x3d0 [ 543.646368][T20947] ? security_kernfs_init_security+0x9a/0xb0 [ 543.646385][T20947] ? __kernfs_new_node+0x50b/0x6d0 [ 543.689196][T20947] ? __kernfs_new_node+0xdb/0x6d0 [ 543.694196][T20947] should_failslab+0x5/0x20 [ 543.698675][T20947] kmem_cache_alloc+0x36/0x290 [ 543.703424][T20947] ? mutex_trylock+0xb0/0xb0 [ 543.708105][T20947] __kernfs_new_node+0xdb/0x6d0 [ 543.712943][T20947] ? kernfs_new_node+0x160/0x160 [ 543.717970][T20947] ? mutex_unlock+0x19/0x40 [ 543.722450][T20947] ? kernfs_add_one+0x49e/0x5c0 [ 543.727279][T20947] ? __kernfs_create_file+0x1f1/0x260 [ 543.732629][T20947] kernfs_new_node+0x95/0x160 [ 543.737279][T20947] __kernfs_create_file+0x45/0x260 [ 543.742365][T20947] sysfs_add_file_mode_ns+0x293/0x340 [ 543.747710][T20947] sysfs_create_file_ns+0x18c/0x2b0 [ 543.752883][T20947] ? sysfs_add_file_mode_ns+0x340/0x340 [ 543.758404][T20947] ? device_create_file+0xe2/0x1a0 [ 543.763498][T20947] device_add+0xc44/0x18a0 [ 543.767902][T20947] ? virtual_device_parent+0x50/0x50 [ 543.773162][T20947] ? pm_runtime_init+0x206/0x320 [ 543.778073][T20947] ? device_initialize+0x1d3/0x3e0 [ 543.783161][T20947] netdev_register_kobject+0x178/0x310 [ 543.788617][T20947] ? raw_notifier_call_chain+0xf2/0x110 [ 543.794136][T20947] register_netdevice+0xbc7/0x1480 [ 543.799221][T20947] ? netdev_update_lockdep_key+0x10/0x10 [ 543.804836][T20947] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 543.809836][T20947] ? __rcu_read_lock+0x50/0x50 [ 543.814580][T20947] ? alloc_netdev_mqs+0xa0c/0xc60 [ 543.819586][T20947] ? vti6_locate+0x551/0x910 [ 543.824169][T20947] vti6_locate+0x610/0x910 [ 543.828586][T20947] ? cap_capable+0x23f/0x280 [ 543.833152][T20947] ? vti6_link_config+0x530/0x530 [ 543.838153][T20947] ? vti6_ioctl+0xa64/0x1b10 [ 543.842746][T20947] vti6_ioctl+0xa88/0x1b10 [ 543.847153][T20947] ? vti6_tnl_xmit+0x1720/0x1720 [ 543.852079][T20947] ? __rcu_read_lock+0x50/0x50 [ 543.856823][T20947] ? check_preemption_disabled+0x154/0x330 [ 543.862619][T20947] ? avc_has_extended_perms+0xb5e/0x1140 [ 543.868232][T20947] ? full_name_hash+0xb4/0xe0 [ 543.872883][T20947] dev_ifsioc+0x675/0xa70 [ 543.877210][T20947] ? mutex_lock+0xa6/0x110 [ 543.881617][T20947] ? dev_ioctl+0xab0/0xab0 [ 543.886009][T20947] dev_ioctl+0x558/0xab0 [ 543.890229][T20947] sock_ioctl+0x677/0x760 [ 543.894530][T20947] ? sock_poll+0x2f0/0x2f0 [ 543.898923][T20947] ? memset+0x1f/0x40 [ 543.902882][T20947] ? fsnotify+0x1332/0x13f0 [ 543.907367][T20947] ? sock_poll+0x2f0/0x2f0 [ 543.911758][T20947] do_vfs_ioctl+0x76a/0x1720 [ 543.916330][T20947] ? selinux_file_ioctl+0x72f/0x990 [ 543.921521][T20947] ? ioctl_preallocate+0x250/0x250 [ 543.926637][T20947] ? __fget+0x37b/0x3c0 [ 543.930769][T20947] ? vfs_write+0x422/0x4e0 [ 543.935167][T20947] ? fget_many+0x20/0x20 [ 543.939409][T20947] ? debug_smp_processor_id+0x20/0x20 [ 543.944755][T20947] ? security_file_ioctl+0x9d/0xb0 [ 543.949847][T20947] __x64_sys_ioctl+0xd4/0x110 [ 543.954507][T20947] do_syscall_64+0xcb/0x1e0 [ 543.958991][T20947] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 543.964867][T20947] RIP: 0033:0x466459 [ 543.968744][T20947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 543.988576][T20947] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 543.996965][T20947] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:29 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x25000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:29 executing program 0 (fault-call:8 fault-nth:68): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:29 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b14}, @mcast2}}) 21:32:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000400900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:29 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x26020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 544.004922][T20947] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 544.012873][T20947] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 544.020839][T20947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 544.028786][T20947] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x300], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4a0], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:29 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x34010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 544.076017][T20960] x_tables: duplicate underflow at hook 2 [ 544.085133][T20949] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 544.110504][T20964] EXT4-fs (loop1): Can't read superblock on 2nd try [ 544.122044][T20970] x_tables: duplicate underflow at hook 2 [ 544.123859][T20966] FAULT_INJECTION: forcing a failure. [ 544.123859][T20966] name failslab, interval 1, probability 0, space 0, times 0 [ 544.143179][T20966] CPU: 1 PID: 20966 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 544.153531][T20966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.163567][T20966] Call Trace: [ 544.166843][T20966] dump_stack+0x1d8/0x24e [ 544.171155][T20966] ? devkmsg_release+0x11c/0x11c [ 544.176069][T20966] ? mutex_unlock+0x19/0x40 [ 544.180548][T20966] ? show_regs_print_info+0x12/0x12 [ 544.185883][T20966] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 544.191937][T20966] should_fail+0x6f6/0x860 [ 544.196338][T20966] ? setup_fault_attr+0x3d0/0x3d0 [ 544.201347][T20966] ? _raw_spin_lock+0xa3/0x1b0 [ 544.206089][T20966] ? __kernfs_new_node+0xdb/0x6d0 [ 544.211121][T20966] should_failslab+0x5/0x20 [ 544.215604][T20966] kmem_cache_alloc+0x36/0x290 [ 544.220343][T20966] __kernfs_new_node+0xdb/0x6d0 [ 544.225175][T20966] ? mutex_lock+0xa6/0x110 [ 544.229582][T20966] ? kernfs_new_node+0x160/0x160 [ 544.234506][T20966] ? make_kgid+0x24f/0x390 [ 544.238909][T20966] ? from_kuid_munged+0x3b0/0x3b0 [ 544.243907][T20966] ? kernfs_activate+0x3fc/0x420 [ 544.248819][T20966] kernfs_create_dir_ns+0x90/0x220 [ 544.253998][T20966] internal_create_group+0x294/0xf10 [ 544.259278][T20966] ? sysfs_create_group+0x20/0x20 [ 544.265334][T20966] ? sysfs_add_file_mode_ns+0x340/0x340 [ 544.270863][T20966] ? bus_add_device+0x92/0x3f0 [ 544.275606][T20966] dpm_sysfs_add+0x59/0x260 [ 544.280127][T20966] device_add+0xde7/0x18a0 [ 544.284559][T20966] ? virtual_device_parent+0x50/0x50 [ 544.290014][T20966] ? pm_runtime_init+0x206/0x320 [ 544.294945][T20966] ? device_initialize+0x1d3/0x3e0 [ 544.300138][T20966] netdev_register_kobject+0x178/0x310 [ 544.305579][T20966] ? raw_notifier_call_chain+0xf2/0x110 [ 544.311117][T20966] register_netdevice+0xbc7/0x1480 [ 544.316215][T20966] ? netdev_update_lockdep_key+0x10/0x10 [ 544.321827][T20966] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 544.326867][T20966] ? __rcu_read_lock+0x50/0x50 [ 544.331623][T20966] ? alloc_netdev_mqs+0xa0c/0xc60 [ 544.336620][T20966] ? vti6_locate+0x551/0x910 [ 544.341181][T20966] vti6_locate+0x610/0x910 [ 544.345571][T20966] ? cap_capable+0x23f/0x280 [ 544.350169][T20966] ? vti6_link_config+0x530/0x530 [ 544.355172][T20966] ? vti6_ioctl+0xa64/0x1b10 [ 544.359734][T20966] vti6_ioctl+0xa88/0x1b10 [ 544.364125][T20966] ? vti6_tnl_xmit+0x1720/0x1720 [ 544.369059][T20966] ? __rcu_read_lock+0x50/0x50 [ 544.373796][T20966] ? check_preemption_disabled+0x154/0x330 [ 544.379612][T20966] ? avc_has_extended_perms+0xb5e/0x1140 [ 544.385243][T20966] ? full_name_hash+0xb4/0xe0 [ 544.389893][T20966] dev_ifsioc+0x675/0xa70 [ 544.394196][T20966] ? mutex_lock+0xa6/0x110 [ 544.398584][T20966] ? dev_ioctl+0xab0/0xab0 [ 544.402978][T20966] dev_ioctl+0x558/0xab0 [ 544.407195][T20966] sock_ioctl+0x677/0x760 [ 544.411502][T20966] ? sock_poll+0x2f0/0x2f0 [ 544.415891][T20966] ? memset+0x1f/0x40 [ 544.419846][T20966] ? fsnotify+0x1332/0x13f0 [ 544.424366][T20966] ? sock_poll+0x2f0/0x2f0 [ 544.428782][T20966] do_vfs_ioctl+0x76a/0x1720 [ 544.433393][T20966] ? selinux_file_ioctl+0x72f/0x990 [ 544.438567][T20966] ? ioctl_preallocate+0x250/0x250 [ 544.443651][T20966] ? __fget+0x37b/0x3c0 [ 544.447782][T20966] ? vfs_write+0x422/0x4e0 [ 544.452196][T20966] ? fget_many+0x20/0x20 [ 544.456412][T20966] ? debug_smp_processor_id+0x20/0x20 [ 544.461775][T20966] ? security_file_ioctl+0x9d/0xb0 [ 544.466860][T20966] __x64_sys_ioctl+0xd4/0x110 [ 544.471513][T20966] do_syscall_64+0xcb/0x1e0 [ 544.475991][T20966] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 544.481857][T20966] RIP: 0033:0x466459 [ 544.485747][T20966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 544.505339][T20966] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 544.513721][T20966] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:29 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:29 executing program 0 (fault-call:8 fault-nth:69): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 544.521666][T20966] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 544.529609][T20966] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 544.537555][T20966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 544.545500][T20966] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 544.584597][T20976] FAULT_INJECTION: forcing a failure. [ 544.584597][T20976] name failslab, interval 1, probability 0, space 0, times 0 [ 544.597257][T20976] CPU: 1 PID: 20976 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 544.607476][T20976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.617527][T20976] Call Trace: [ 544.620807][T20976] dump_stack+0x1d8/0x24e [ 544.625160][T20976] ? devkmsg_release+0x11c/0x11c [ 544.630078][T20976] ? show_regs_print_info+0x12/0x12 [ 544.635255][T20976] should_fail+0x6f6/0x860 [ 544.639646][T20976] ? setup_fault_attr+0x3d0/0x3d0 [ 544.644644][T20976] ? security_kernfs_init_security+0x9a/0xb0 [ 544.650594][T20976] ? __kernfs_new_node+0x50b/0x6d0 [ 544.655678][T20976] ? __kernfs_new_node+0xdb/0x6d0 [ 544.660689][T20976] should_failslab+0x5/0x20 [ 544.665175][T20976] kmem_cache_alloc+0x36/0x290 [ 544.669916][T20976] ? mutex_trylock+0xb0/0xb0 [ 544.674588][T20976] __kernfs_new_node+0xdb/0x6d0 [ 544.679412][T20976] ? kernfs_new_node+0x160/0x160 [ 544.684345][T20976] ? mutex_unlock+0x19/0x40 [ 544.688824][T20976] ? kernfs_add_one+0x49e/0x5c0 [ 544.693647][T20976] ? __kernfs_create_file+0x1f1/0x260 [ 544.698991][T20976] kernfs_new_node+0x95/0x160 [ 544.703642][T20976] __kernfs_create_file+0x45/0x260 [ 544.708727][T20976] sysfs_add_file_mode_ns+0x293/0x340 [ 544.714081][T20976] sysfs_create_file_ns+0x18c/0x2b0 [ 544.719253][T20976] ? sysfs_add_file_mode_ns+0x340/0x340 [ 544.724772][T20976] ? device_create_file+0xe2/0x1a0 [ 544.729854][T20976] device_add+0xc44/0x18a0 [ 544.734274][T20976] ? virtual_device_parent+0x50/0x50 [ 544.739541][T20976] ? pm_runtime_init+0x206/0x320 [ 544.744478][T20976] ? device_initialize+0x1d3/0x3e0 [ 544.749569][T20976] netdev_register_kobject+0x178/0x310 [ 544.755013][T20976] ? raw_notifier_call_chain+0xf2/0x110 [ 544.760559][T20976] register_netdevice+0xbc7/0x1480 [ 544.765651][T20976] ? netdev_update_lockdep_key+0x10/0x10 [ 544.771258][T20976] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 544.776255][T20976] ? __rcu_read_lock+0x50/0x50 [ 544.780991][T20976] ? alloc_netdev_mqs+0xa0c/0xc60 [ 544.785986][T20976] ? vti6_locate+0x551/0x910 [ 544.790549][T20976] vti6_locate+0x610/0x910 [ 544.794946][T20976] ? cap_capable+0x23f/0x280 [ 544.799522][T20976] ? vti6_link_config+0x530/0x530 [ 544.804521][T20976] ? vti6_ioctl+0xa64/0x1b10 [ 544.809086][T20976] vti6_ioctl+0xa88/0x1b10 [ 544.813501][T20976] ? vti6_tnl_xmit+0x1720/0x1720 [ 544.818415][T20976] ? __rcu_read_lock+0x50/0x50 [ 544.823155][T20976] ? check_preemption_disabled+0x154/0x330 [ 544.828945][T20976] ? avc_has_extended_perms+0xb5e/0x1140 [ 544.834686][T20976] ? full_name_hash+0xb4/0xe0 [ 544.839412][T20976] dev_ifsioc+0x675/0xa70 [ 544.843737][T20976] ? mutex_lock+0xa6/0x110 [ 544.848286][T20976] ? dev_ioctl+0xab0/0xab0 [ 544.852905][T20976] dev_ioctl+0x558/0xab0 [ 544.857184][T20976] sock_ioctl+0x677/0x760 [ 544.861494][T20976] ? sock_poll+0x2f0/0x2f0 [ 544.865936][T20976] ? memset+0x1f/0x40 [ 544.869895][T20976] ? fsnotify+0x1332/0x13f0 [ 544.874378][T20976] ? sock_poll+0x2f0/0x2f0 [ 544.878779][T20976] do_vfs_ioctl+0x76a/0x1720 [ 544.883345][T20976] ? selinux_file_ioctl+0x72f/0x990 [ 544.888528][T20976] ? ioctl_preallocate+0x250/0x250 [ 544.893795][T20976] ? __fget+0x37b/0x3c0 [ 544.897928][T20976] ? vfs_write+0x422/0x4e0 [ 544.902321][T20976] ? fget_many+0x20/0x20 [ 544.906539][T20976] ? debug_smp_processor_id+0x20/0x20 [ 544.911890][T20976] ? security_file_ioctl+0x9d/0xb0 [ 544.916986][T20976] __x64_sys_ioctl+0xd4/0x110 [ 544.921774][T20976] do_syscall_64+0xcb/0x1e0 [ 544.926364][T20976] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 544.932248][T20976] RIP: 0033:0x466459 [ 544.936117][T20976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 544.955694][T20976] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 544.964079][T20976] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 544.972027][T20976] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:30 executing program 0 (fault-call:8 fault-nth:70): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:30 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b15}, @mcast2}}) [ 544.979972][T20976] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 544.987916][T20976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 544.995861][T20976] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:30 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x36020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 545.036057][T20981] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 545.055739][T20986] FAULT_INJECTION: forcing a failure. [ 545.055739][T20986] name failslab, interval 1, probability 0, space 0, times 0 [ 545.058731][T20989] x_tables: duplicate underflow at hook 2 [ 545.069149][T20986] CPU: 1 PID: 20986 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 545.084462][T20986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.094557][T20986] Call Trace: [ 545.097833][T20986] dump_stack+0x1d8/0x24e [ 545.102138][T20986] ? devkmsg_release+0x11c/0x11c [ 545.107051][T20986] ? show_regs_print_info+0x12/0x12 [ 545.112246][T20986] should_fail+0x6f6/0x860 [ 545.116639][T20986] ? setup_fault_attr+0x3d0/0x3d0 [ 545.121656][T20986] ? security_kernfs_init_security+0x9a/0xb0 [ 545.127615][T20986] ? __kernfs_new_node+0x50b/0x6d0 [ 545.132703][T20986] ? __kernfs_new_node+0xdb/0x6d0 [ 545.137700][T20986] should_failslab+0x5/0x20 [ 545.142177][T20986] kmem_cache_alloc+0x36/0x290 [ 545.146916][T20986] ? mutex_trylock+0xb0/0xb0 [ 545.151506][T20986] __kernfs_new_node+0xdb/0x6d0 [ 545.156330][T20986] ? kernfs_new_node+0x160/0x160 [ 545.161249][T20986] ? mutex_unlock+0x19/0x40 [ 545.165727][T20986] ? kernfs_add_one+0x49e/0x5c0 [ 545.170552][T20986] ? __kernfs_create_file+0x1f1/0x260 [ 545.175894][T20986] kernfs_new_node+0x95/0x160 [ 545.180545][T20986] __kernfs_create_file+0x45/0x260 [ 545.185640][T20986] sysfs_add_file_mode_ns+0x293/0x340 [ 545.190994][T20986] sysfs_create_file_ns+0x18c/0x2b0 [ 545.196168][T20986] ? sysfs_add_file_mode_ns+0x340/0x340 [ 545.201691][T20986] ? device_create_file+0xe2/0x1a0 [ 545.206823][T20986] device_add+0xc44/0x18a0 [ 545.211228][T20986] ? virtual_device_parent+0x50/0x50 [ 545.216501][T20986] ? pm_runtime_init+0x206/0x320 [ 545.221409][T20986] ? device_initialize+0x1d3/0x3e0 [ 545.226496][T20986] netdev_register_kobject+0x178/0x310 [ 545.231931][T20986] ? raw_notifier_call_chain+0xf2/0x110 [ 545.237453][T20986] register_netdevice+0xbc7/0x1480 [ 545.242556][T20986] ? netdev_update_lockdep_key+0x10/0x10 [ 545.248168][T20986] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 545.253167][T20986] ? __rcu_read_lock+0x50/0x50 [ 545.257910][T20986] ? alloc_netdev_mqs+0xa0c/0xc60 [ 545.262914][T20986] ? vti6_locate+0x551/0x910 [ 545.267476][T20986] vti6_locate+0x610/0x910 [ 545.271868][T20986] ? cap_capable+0x23f/0x280 [ 545.276435][T20986] ? vti6_link_config+0x530/0x530 [ 545.281447][T20986] ? vti6_ioctl+0xa64/0x1b10 [ 545.286009][T20986] vti6_ioctl+0xa88/0x1b10 [ 545.290398][T20986] ? vti6_tnl_xmit+0x1720/0x1720 [ 545.295308][T20986] ? __rcu_read_lock+0x50/0x50 [ 545.300045][T20986] ? check_preemption_disabled+0x154/0x330 [ 545.305831][T20986] ? avc_has_extended_perms+0xb5e/0x1140 [ 545.311438][T20986] ? full_name_hash+0xb4/0xe0 [ 545.316088][T20986] dev_ifsioc+0x675/0xa70 [ 545.320389][T20986] ? mutex_lock+0xa6/0x110 [ 545.324775][T20986] ? dev_ioctl+0xab0/0xab0 [ 545.329162][T20986] dev_ioctl+0x558/0xab0 [ 545.333389][T20986] sock_ioctl+0x677/0x760 [ 545.337702][T20986] ? sock_poll+0x2f0/0x2f0 [ 545.342095][T20986] ? memset+0x1f/0x40 [ 545.346053][T20986] ? fsnotify+0x1332/0x13f0 [ 545.350546][T20986] ? sock_poll+0x2f0/0x2f0 [ 545.354956][T20986] do_vfs_ioctl+0x76a/0x1720 [ 545.359527][T20986] ? selinux_file_ioctl+0x72f/0x990 [ 545.364703][T20986] ? ioctl_preallocate+0x250/0x250 [ 545.369795][T20986] ? __fget+0x37b/0x3c0 [ 545.373928][T20986] ? vfs_write+0x422/0x4e0 [ 545.378321][T20986] ? fget_many+0x20/0x20 [ 545.382538][T20986] ? debug_smp_processor_id+0x20/0x20 [ 545.387885][T20986] ? security_file_ioctl+0x9d/0xb0 [ 545.392969][T20986] __x64_sys_ioctl+0xd4/0x110 [ 545.397620][T20986] do_syscall_64+0xcb/0x1e0 [ 545.402123][T20986] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 545.407990][T20986] RIP: 0033:0x466459 [ 545.411874][T20986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 21:32:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000500900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x500], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:30 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:30 executing program 0 (fault-call:8 fault-nth:71): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 545.431455][T20986] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 545.439842][T20986] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 545.447789][T20986] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 545.455734][T20986] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 545.463678][T20986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 545.471623][T20986] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 545.525224][T21000] x_tables: duplicate underflow at hook 2 [ 545.529055][T21003] FAULT_INJECTION: forcing a failure. [ 545.529055][T21003] name failslab, interval 1, probability 0, space 0, times 0 [ 545.543739][T21003] CPU: 1 PID: 21003 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 545.553965][T21003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.564003][T21003] Call Trace: [ 545.567301][T21003] dump_stack+0x1d8/0x24e [ 545.571615][T21003] ? devkmsg_release+0x11c/0x11c [ 545.576530][T21003] ? arch_stack_walk+0xf8/0x140 [ 545.581363][T21003] ? show_regs_print_info+0x12/0x12 [ 545.586542][T21003] should_fail+0x6f6/0x860 [ 545.590938][T21003] ? setup_fault_attr+0x3d0/0x3d0 [ 545.595942][T21003] ? stack_trace_save+0x120/0x1f0 [ 545.600959][T21003] ? radix_tree_node_alloc+0x18c/0x370 [ 545.606410][T21003] should_failslab+0x5/0x20 [ 545.610893][T21003] kmem_cache_alloc+0x36/0x290 [ 545.615632][T21003] ? __kasan_kmalloc+0x1a3/0x1e0 [ 545.620565][T21003] radix_tree_node_alloc+0x18c/0x370 [ 545.625824][T21003] ? dpm_sysfs_add+0xbd/0x260 [ 545.630477][T21003] ? device_add+0xde7/0x18a0 [ 545.635043][T21003] ? netdev_register_kobject+0x178/0x310 [ 545.640650][T21003] ? register_netdevice+0xbc7/0x1480 [ 545.645912][T21003] idr_get_free+0x2aa/0x900 [ 545.650395][T21003] idr_alloc_cyclic+0x1ef/0x5d0 [ 545.655227][T21003] ? idr_alloc+0x2f0/0x2f0 [ 545.659629][T21003] ? _raw_spin_lock+0xa3/0x1b0 [ 545.664374][T21003] __kernfs_new_node+0x122/0x6d0 [ 545.669291][T21003] ? kernfs_new_node+0x160/0x160 [ 545.674207][T21003] ? mutex_lock+0xa6/0x110 [ 545.678598][T21003] ? kernfs_activate+0x3fc/0x420 [ 545.683510][T21003] kernfs_new_node+0x95/0x160 [ 545.688167][T21003] __kernfs_create_file+0x45/0x260 [ 545.693280][T21003] sysfs_add_file_mode_ns+0x293/0x340 [ 545.698642][T21003] sysfs_merge_group+0x204/0x440 [ 545.703562][T21003] ? sysfs_remove_groups+0xb0/0xb0 [ 545.708654][T21003] ? sysfs_add_file_mode_ns+0x340/0x340 [ 545.714184][T21003] ? bus_add_device+0x92/0x3f0 [ 545.718930][T21003] dpm_sysfs_add+0xbd/0x260 [ 545.723414][T21003] device_add+0xde7/0x18a0 [ 545.727809][T21003] ? virtual_device_parent+0x50/0x50 [ 545.733067][T21003] ? pm_runtime_init+0x206/0x320 [ 545.737984][T21003] ? device_initialize+0x1d3/0x3e0 [ 545.743072][T21003] netdev_register_kobject+0x178/0x310 [ 545.748508][T21003] ? raw_notifier_call_chain+0xf2/0x110 [ 545.754030][T21003] register_netdevice+0xbc7/0x1480 [ 545.759120][T21003] ? netdev_update_lockdep_key+0x10/0x10 [ 545.764727][T21003] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 545.769726][T21003] ? __rcu_read_lock+0x50/0x50 [ 545.774464][T21003] ? alloc_netdev_mqs+0xa0c/0xc60 [ 545.779463][T21003] ? vti6_locate+0x551/0x910 [ 545.784026][T21003] vti6_locate+0x610/0x910 [ 545.788419][T21003] ? cap_capable+0x23f/0x280 [ 545.792985][T21003] ? vti6_link_config+0x530/0x530 [ 545.797983][T21003] ? vti6_ioctl+0xa64/0x1b10 [ 545.802549][T21003] vti6_ioctl+0xa88/0x1b10 [ 545.806942][T21003] ? vti6_tnl_xmit+0x1720/0x1720 [ 545.811873][T21003] ? __rcu_read_lock+0x50/0x50 [ 545.816617][T21003] ? check_preemption_disabled+0x154/0x330 [ 545.822426][T21003] ? avc_has_extended_perms+0xb5e/0x1140 [ 545.828040][T21003] ? full_name_hash+0xb4/0xe0 [ 545.832697][T21003] dev_ifsioc+0x675/0xa70 [ 545.837004][T21003] ? mutex_lock+0x106/0x110 [ 545.841480][T21003] ? dev_ioctl+0xab0/0xab0 [ 545.845870][T21003] dev_ioctl+0x558/0xab0 [ 545.850088][T21003] sock_ioctl+0x677/0x760 [ 545.854394][T21003] ? sock_poll+0x2f0/0x2f0 [ 545.858801][T21003] ? memset+0x1f/0x40 [ 545.862761][T21003] ? fsnotify+0x1332/0x13f0 [ 545.867239][T21003] ? sock_poll+0x2f0/0x2f0 [ 545.871642][T21003] do_vfs_ioctl+0x76a/0x1720 [ 545.876223][T21003] ? selinux_file_ioctl+0x72f/0x990 [ 545.881411][T21003] ? ioctl_preallocate+0x250/0x250 [ 545.886503][T21003] ? __fget+0x37b/0x3c0 [ 545.890635][T21003] ? vfs_write+0x422/0x4e0 [ 545.895044][T21003] ? fget_many+0x20/0x20 [ 545.899285][T21003] ? debug_smp_processor_id+0x20/0x20 [ 545.904790][T21003] ? security_file_ioctl+0x9d/0xb0 [ 545.909885][T21003] __x64_sys_ioctl+0xd4/0x110 [ 545.914557][T21003] do_syscall_64+0xcb/0x1e0 [ 545.919041][T21003] entry_SYSCALL_64_after_hwframe+0x44/0xa9 21:32:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x5c0], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 545.924913][T21003] RIP: 0033:0x466459 [ 545.928785][T21003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 545.948367][T21003] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 545.956769][T21003] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 545.964716][T21003] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:31 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x40000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:31 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b16}, @mcast2}}) 21:32:31 executing program 0 (fault-call:8 fault-nth:72): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 545.972669][T21003] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 545.980634][T21003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 545.988601][T21003] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 546.017339][T21001] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 21:32:31 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:31 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x40010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x600], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 546.026584][T20997] EXT4-fs (loop1): Can't read superblock on 2nd try [ 546.042619][T21009] x_tables: duplicate underflow at hook 2 [ 546.117239][T21017] FAULT_INJECTION: forcing a failure. [ 546.117239][T21017] name failslab, interval 1, probability 0, space 0, times 0 [ 546.130091][T21017] CPU: 0 PID: 21017 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 546.140308][T21017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.150342][T21017] Call Trace: [ 546.153618][T21017] dump_stack+0x1d8/0x24e [ 546.157931][T21017] ? devkmsg_release+0x11c/0x11c [ 546.162844][T21017] ? mutex_unlock+0x19/0x40 [ 546.167325][T21017] ? show_regs_print_info+0x12/0x12 [ 546.172507][T21017] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 546.178650][T21017] should_fail+0x6f6/0x860 [ 546.183047][T21017] ? setup_fault_attr+0x3d0/0x3d0 [ 546.188050][T21017] ? _raw_spin_lock+0xa3/0x1b0 [ 546.192810][T21017] ? __kernfs_new_node+0xdb/0x6d0 [ 546.197814][T21017] should_failslab+0x5/0x20 [ 546.202291][T21017] kmem_cache_alloc+0x36/0x290 [ 546.207032][T21017] __kernfs_new_node+0xdb/0x6d0 [ 546.211857][T21017] ? mutex_lock+0xa6/0x110 [ 546.216245][T21017] ? kernfs_new_node+0x160/0x160 [ 546.221165][T21017] ? mutex_lock+0xa6/0x110 [ 546.225584][T21017] ? kernfs_activate+0x3fc/0x420 [ 546.230497][T21017] kernfs_new_node+0x95/0x160 [ 546.235158][T21017] __kernfs_create_file+0x45/0x260 [ 546.240270][T21017] sysfs_add_file_mode_ns+0x293/0x340 [ 546.245638][T21017] sysfs_merge_group+0x204/0x440 [ 546.250566][T21017] ? sysfs_remove_groups+0xb0/0xb0 [ 546.255819][T21017] ? sysfs_add_file_mode_ns+0x340/0x340 [ 546.263101][T21017] ? bus_add_device+0x92/0x3f0 [ 546.267938][T21017] dpm_sysfs_add+0xbd/0x260 [ 546.272427][T21017] device_add+0xde7/0x18a0 [ 546.276827][T21017] ? virtual_device_parent+0x50/0x50 [ 546.282348][T21017] ? pm_runtime_init+0x206/0x320 [ 546.287281][T21017] ? device_initialize+0x1d3/0x3e0 [ 546.292551][T21017] netdev_register_kobject+0x178/0x310 [ 546.298005][T21017] ? raw_notifier_call_chain+0xf2/0x110 [ 546.303547][T21017] register_netdevice+0xbc7/0x1480 [ 546.308652][T21017] ? netdev_update_lockdep_key+0x10/0x10 [ 546.314265][T21017] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 546.319268][T21017] ? __rcu_read_lock+0x50/0x50 [ 546.324002][T21017] ? alloc_netdev_mqs+0xa0c/0xc60 [ 546.329017][T21017] ? vti6_locate+0x551/0x910 [ 546.333602][T21017] vti6_locate+0x610/0x910 [ 546.338002][T21017] ? cap_capable+0x23f/0x280 [ 546.342572][T21017] ? vti6_link_config+0x530/0x530 [ 546.347580][T21017] ? vti6_ioctl+0xa64/0x1b10 [ 546.352142][T21017] vti6_ioctl+0xa88/0x1b10 [ 546.356549][T21017] ? vti6_tnl_xmit+0x1720/0x1720 [ 546.361479][T21017] ? avc_has_extended_perms+0xb5e/0x1140 [ 546.367088][T21017] ? full_name_hash+0xb4/0xe0 [ 546.371741][T21017] dev_ifsioc+0x675/0xa70 [ 546.376047][T21017] ? mutex_lock+0x106/0x110 [ 546.380526][T21017] ? dev_ioctl+0xab0/0xab0 [ 546.384927][T21017] dev_ioctl+0x558/0xab0 [ 546.389180][T21017] sock_ioctl+0x677/0x760 [ 546.393494][T21017] ? sock_poll+0x2f0/0x2f0 [ 546.397897][T21017] ? memset+0x1f/0x40 [ 546.401957][T21017] ? fsnotify+0x1332/0x13f0 [ 546.406434][T21017] ? sock_poll+0x2f0/0x2f0 [ 546.410830][T21017] do_vfs_ioctl+0x76a/0x1720 [ 546.415415][T21017] ? selinux_file_ioctl+0x72f/0x990 [ 546.420605][T21017] ? ioctl_preallocate+0x250/0x250 [ 546.425689][T21017] ? __fget+0x37b/0x3c0 [ 546.429818][T21017] ? vfs_write+0x422/0x4e0 [ 546.434210][T21017] ? fget_many+0x20/0x20 [ 546.438467][T21017] ? debug_smp_processor_id+0x20/0x20 [ 546.443814][T21017] ? security_file_ioctl+0x9d/0xb0 [ 546.448923][T21017] __x64_sys_ioctl+0xd4/0x110 [ 546.453577][T21017] do_syscall_64+0xcb/0x1e0 [ 546.458080][T21017] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 546.463942][T21017] RIP: 0033:0x466459 [ 546.467808][T21017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 546.487385][T21017] RSP: 002b:00007faa9aa7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 546.495786][T21017] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 546.503805][T21017] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:31 executing program 0 (fault-call:8 fault-nth:73): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 546.511767][T21017] RBP: 00007faa9aa7f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 546.519714][T21017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 546.527658][T21017] R13: 00007ffe4ada44ff R14: 00007faa9aa7f300 R15: 0000000000022000 [ 546.559131][T21019] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 546.566009][T21021] EXT4-fs (loop1): Can't read superblock on 2nd try [ 546.588040][T21027] x_tables: duplicate underflow at hook 2 [ 546.607420][T21030] FAULT_INJECTION: forcing a failure. [ 546.607420][T21030] name failslab, interval 1, probability 0, space 0, times 0 [ 546.620222][T21030] CPU: 1 PID: 21030 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 546.630547][T21030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.640686][T21030] Call Trace: [ 546.643968][T21030] dump_stack+0x1d8/0x24e [ 546.648277][T21030] ? devkmsg_release+0x11c/0x11c [ 546.653191][T21030] ? mutex_unlock+0x19/0x40 [ 546.657671][T21030] ? show_regs_print_info+0x12/0x12 [ 546.662850][T21030] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 546.668899][T21030] should_fail+0x6f6/0x860 [ 546.673289][T21030] ? setup_fault_attr+0x3d0/0x3d0 [ 546.678287][T21030] ? _raw_spin_lock+0xa3/0x1b0 [ 546.683024][T21030] ? __kernfs_new_node+0xdb/0x6d0 [ 546.688020][T21030] should_failslab+0x5/0x20 [ 546.692499][T21030] kmem_cache_alloc+0x36/0x290 [ 546.697238][T21030] __kernfs_new_node+0xdb/0x6d0 [ 546.702064][T21030] ? mutex_lock+0xa6/0x110 [ 546.706469][T21030] ? kernfs_new_node+0x160/0x160 [ 546.711396][T21030] ? mutex_lock+0xa6/0x110 [ 546.715785][T21030] ? kernfs_activate+0x3fc/0x420 [ 546.720711][T21030] kernfs_new_node+0x95/0x160 [ 546.725361][T21030] __kernfs_create_file+0x45/0x260 [ 546.730461][T21030] sysfs_add_file_mode_ns+0x293/0x340 [ 546.735820][T21030] sysfs_merge_group+0x204/0x440 [ 546.740729][T21030] ? sysfs_remove_groups+0xb0/0xb0 [ 546.745811][T21030] ? sysfs_add_file_mode_ns+0x340/0x340 [ 546.751335][T21030] ? bus_add_device+0x92/0x3f0 [ 546.756079][T21030] dpm_sysfs_add+0xbd/0x260 [ 546.760562][T21030] device_add+0xde7/0x18a0 [ 546.764954][T21030] ? virtual_device_parent+0x50/0x50 [ 546.770217][T21030] ? pm_runtime_init+0x206/0x320 [ 546.775127][T21030] ? device_initialize+0x1d3/0x3e0 [ 546.780248][T21030] netdev_register_kobject+0x178/0x310 [ 546.785682][T21030] ? raw_notifier_call_chain+0xf2/0x110 [ 546.791226][T21030] register_netdevice+0xbc7/0x1480 [ 546.796312][T21030] ? netdev_update_lockdep_key+0x10/0x10 [ 546.801918][T21030] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 546.806923][T21030] ? __rcu_read_lock+0x50/0x50 [ 546.811665][T21030] ? alloc_netdev_mqs+0xa0c/0xc60 [ 546.816669][T21030] ? vti6_locate+0x551/0x910 [ 546.821235][T21030] vti6_locate+0x610/0x910 [ 546.825624][T21030] ? cap_capable+0x23f/0x280 [ 546.830187][T21030] ? vti6_link_config+0x530/0x530 [ 546.835204][T21030] ? vti6_ioctl+0xa64/0x1b10 [ 546.839768][T21030] vti6_ioctl+0xa88/0x1b10 [ 546.844157][T21030] ? vti6_tnl_xmit+0x1720/0x1720 [ 546.849096][T21030] ? __rcu_read_lock+0x50/0x50 [ 546.853843][T21030] ? check_preemption_disabled+0x154/0x330 [ 546.859624][T21030] ? avc_has_extended_perms+0xb5e/0x1140 [ 546.865228][T21030] ? full_name_hash+0xb4/0xe0 [ 546.869897][T21030] dev_ifsioc+0x675/0xa70 [ 546.874210][T21030] ? mutex_lock+0xa6/0x110 [ 546.878622][T21030] ? dev_ioctl+0xab0/0xab0 [ 546.883139][T21030] dev_ioctl+0x558/0xab0 [ 546.887362][T21030] sock_ioctl+0x677/0x760 [ 546.891676][T21030] ? sock_poll+0x2f0/0x2f0 [ 546.896074][T21030] ? memset+0x1f/0x40 [ 546.900032][T21030] ? fsnotify+0x1332/0x13f0 [ 546.904514][T21030] ? sock_poll+0x2f0/0x2f0 [ 546.908904][T21030] do_vfs_ioctl+0x76a/0x1720 [ 546.913475][T21030] ? selinux_file_ioctl+0x72f/0x990 [ 546.918647][T21030] ? ioctl_preallocate+0x250/0x250 [ 546.923873][T21030] ? __fget+0x37b/0x3c0 [ 546.928067][T21030] ? vfs_write+0x422/0x4e0 [ 546.932460][T21030] ? fget_many+0x20/0x20 [ 546.936676][T21030] ? debug_smp_processor_id+0x20/0x20 [ 546.942036][T21030] ? security_file_ioctl+0x9d/0xb0 [ 546.947134][T21030] __x64_sys_ioctl+0xd4/0x110 [ 546.951842][T21030] do_syscall_64+0xcb/0x1e0 [ 546.956426][T21030] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 546.962295][T21030] RIP: 0033:0x466459 [ 546.966165][T21030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 546.985743][T21030] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 546.994126][T21030] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 547.002069][T21030] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000600900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:32 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b17}, @mcast2}}) 21:32:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:32 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x48000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x700], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:32 executing program 0 (fault-call:8 fault-nth:74): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x900], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 547.010013][T21030] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 547.017958][T21030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 547.025903][T21030] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) [ 547.059313][T21036] x_tables: duplicate underflow at hook 2 [ 547.074288][T21038] secmark_tg_check: 12 callbacks suppressed [ 547.074293][T21038] xt_SECMARK: invalid mode: 0 [ 547.096349][T21039] FAULT_INJECTION: forcing a failure. [ 547.096349][T21039] name failslab, interval 1, probability 0, space 0, times 0 21:32:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xa00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:32 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x4c000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 547.097151][T21044] x_tables: duplicate underflow at hook 2 [ 547.124224][T21046] xt_SECMARK: invalid mode: 0 [ 547.131175][T21039] CPU: 1 PID: 21039 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 547.141425][T21039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.151578][T21039] Call Trace: [ 547.154897][T21039] dump_stack+0x1d8/0x24e [ 547.159202][T21039] ? devkmsg_release+0x11c/0x11c [ 547.164124][T21039] ? show_regs_print_info+0x12/0x12 [ 547.169300][T21039] ? __schedule+0x9b8/0x1170 [ 547.173872][T21039] should_fail+0x6f6/0x860 [ 547.178271][T21039] ? setup_fault_attr+0x3d0/0x3d0 [ 547.183272][T21039] ? __kernfs_new_node+0xdb/0x6d0 [ 547.188269][T21039] should_failslab+0x5/0x20 [ 547.192756][T21039] kmem_cache_alloc+0x36/0x290 [ 547.197531][T21039] __kernfs_new_node+0xdb/0x6d0 [ 547.202364][T21039] ? mutex_lock+0xa6/0x110 [ 547.206758][T21039] ? kernfs_new_node+0x160/0x160 [ 547.211721][T21039] ? kernfs_link_sibling+0x2ce/0x350 [ 547.217024][T21039] ? asan.module_dtor+0x20/0x20 [ 547.221855][T21039] ? kernfs_activate+0x3fc/0x420 [ 547.226789][T21039] kernfs_new_node+0x95/0x160 [ 547.231443][T21039] __kernfs_create_file+0x45/0x260 [ 547.236529][T21039] sysfs_add_file_mode_ns+0x293/0x340 [ 547.241877][T21039] sysfs_merge_group+0x204/0x440 [ 547.246789][T21039] ? sysfs_remove_groups+0xb0/0xb0 [ 547.251878][T21039] ? sysfs_add_file_mode_ns+0x340/0x340 [ 547.257401][T21039] ? bus_add_device+0x92/0x3f0 [ 547.262249][T21039] dpm_sysfs_add+0xbd/0x260 [ 547.266735][T21039] device_add+0xde7/0x18a0 [ 547.271306][T21039] ? virtual_device_parent+0x50/0x50 [ 547.276575][T21039] ? pm_runtime_init+0x206/0x320 [ 547.281494][T21039] ? device_initialize+0x1d3/0x3e0 [ 547.286591][T21039] netdev_register_kobject+0x178/0x310 [ 547.292028][T21039] ? raw_notifier_call_chain+0xf2/0x110 [ 547.297555][T21039] register_netdevice+0xbc7/0x1480 [ 547.302641][T21039] ? netdev_update_lockdep_key+0x10/0x10 [ 547.308247][T21039] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 547.313246][T21039] ? __rcu_read_lock+0x50/0x50 [ 547.317984][T21039] ? alloc_netdev_mqs+0xa0c/0xc60 [ 547.323067][T21039] ? vti6_locate+0x551/0x910 [ 547.327630][T21039] vti6_locate+0x610/0x910 [ 547.332023][T21039] ? cap_capable+0x23f/0x280 [ 547.336602][T21039] ? vti6_link_config+0x530/0x530 [ 547.341645][T21039] ? vti6_ioctl+0xa64/0x1b10 [ 547.346223][T21039] vti6_ioctl+0xa88/0x1b10 [ 547.350621][T21039] ? vti6_tnl_xmit+0x1720/0x1720 [ 547.355537][T21039] ? __rcu_read_lock+0x50/0x50 [ 547.360279][T21039] ? check_preemption_disabled+0x154/0x330 [ 547.366067][T21039] ? avc_has_extended_perms+0xb5e/0x1140 [ 547.371682][T21039] ? full_name_hash+0xb4/0xe0 [ 547.376334][T21039] dev_ifsioc+0x675/0xa70 [ 547.380653][T21039] ? mutex_lock+0xa6/0x110 [ 547.385081][T21039] ? dev_ioctl+0xab0/0xab0 [ 547.389472][T21039] dev_ioctl+0x558/0xab0 [ 547.393688][T21039] sock_ioctl+0x677/0x760 [ 547.397991][T21039] ? sock_poll+0x2f0/0x2f0 [ 547.402380][T21039] ? memset+0x1f/0x40 [ 547.406335][T21039] ? fsnotify+0x1332/0x13f0 [ 547.410808][T21039] ? sock_poll+0x2f0/0x2f0 [ 547.415201][T21039] do_vfs_ioctl+0x76a/0x1720 [ 547.419767][T21039] ? selinux_file_ioctl+0x72f/0x990 [ 547.424936][T21039] ? ioctl_preallocate+0x250/0x250 [ 547.430034][T21039] ? __fget+0x37b/0x3c0 [ 547.434169][T21039] ? vfs_write+0x422/0x4e0 [ 547.438575][T21039] ? fget_many+0x20/0x20 [ 547.442809][T21039] ? debug_smp_processor_id+0x20/0x20 [ 547.448153][T21039] ? security_file_ioctl+0x9d/0xb0 [ 547.453235][T21039] __x64_sys_ioctl+0xd4/0x110 [ 547.457885][T21039] do_syscall_64+0xcb/0x1e0 [ 547.462377][T21039] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 547.468242][T21039] RIP: 0033:0x466459 [ 547.472109][T21039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 547.491683][T21039] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 547.500180][T21039] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:32 executing program 0 (fault-call:8 fault-nth:75): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 547.508127][T21039] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 547.516088][T21039] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 547.524054][T21039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 547.532009][T21039] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:32 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b18}, @mcast2}}) [ 547.579502][T21045] EXT4-fs (loop1): Can't read superblock on 2nd try [ 547.588219][T21054] xt_SECMARK: invalid mode: 0 [ 547.600439][T21049] FAULT_INJECTION: forcing a failure. [ 547.600439][T21049] name failslab, interval 1, probability 0, space 0, times 0 [ 547.617518][T21056] xt_SECMARK: invalid mode: 0 [ 547.634692][T21049] CPU: 1 PID: 21049 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 547.644950][T21049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.655034][T21049] Call Trace: [ 547.658333][T21049] dump_stack+0x1d8/0x24e [ 547.662669][T21049] ? devkmsg_release+0x11c/0x11c [ 547.667611][T21049] ? show_regs_print_info+0x12/0x12 [ 547.672807][T21049] should_fail+0x6f6/0x860 [ 547.677223][T21049] ? setup_fault_attr+0x3d0/0x3d0 [ 547.682249][T21049] ? kzalloc+0x1d/0x30 [ 547.686317][T21049] should_failslab+0x5/0x20 [ 547.690819][T21049] __kmalloc+0x5f/0x2f0 [ 547.694970][T21049] ? kobject_uevent_env+0x252/0x1040 [ 547.700246][T21049] kzalloc+0x1d/0x30 [ 547.704136][T21049] kobject_get_path+0xb3/0x190 [ 547.708893][T21049] kobject_uevent_env+0x269/0x1040 [ 547.713999][T21049] device_add+0xf42/0x18a0 [ 547.718417][T21049] ? virtual_device_parent+0x50/0x50 [ 547.723690][T21049] ? pm_runtime_init+0x206/0x320 [ 547.728726][T21049] ? device_initialize+0x1d3/0x3e0 [ 547.733835][T21049] netdev_register_kobject+0x178/0x310 [ 547.739291][T21049] ? raw_notifier_call_chain+0xf2/0x110 [ 547.744836][T21049] register_netdevice+0xbc7/0x1480 [ 547.749954][T21049] ? netdev_update_lockdep_key+0x10/0x10 [ 547.755589][T21049] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 547.760612][T21049] ? __rcu_read_lock+0x50/0x50 [ 547.765375][T21049] ? alloc_netdev_mqs+0xa0c/0xc60 [ 547.770395][T21049] ? vti6_locate+0x551/0x910 [ 547.774983][T21049] vti6_locate+0x610/0x910 [ 547.779404][T21049] ? cap_capable+0x23f/0x280 [ 547.783993][T21049] ? vti6_link_config+0x530/0x530 [ 547.789025][T21049] ? vti6_ioctl+0xa64/0x1b10 [ 547.793614][T21049] vti6_ioctl+0xa88/0x1b10 [ 547.798036][T21049] ? vti6_tnl_xmit+0x1720/0x1720 [ 547.802968][T21049] ? __rcu_read_lock+0x50/0x50 [ 547.807728][T21049] ? check_preemption_disabled+0x154/0x330 [ 547.813530][T21049] ? avc_has_extended_perms+0xb5e/0x1140 [ 547.819157][T21049] ? full_name_hash+0xb4/0xe0 [ 547.823829][T21049] dev_ifsioc+0x675/0xa70 [ 547.828158][T21049] ? mutex_lock+0xa6/0x110 [ 547.832572][T21049] ? dev_ioctl+0xab0/0xab0 [ 547.836987][T21049] dev_ioctl+0x558/0xab0 [ 547.841235][T21049] sock_ioctl+0x677/0x760 [ 547.845565][T21049] ? sock_poll+0x2f0/0x2f0 [ 547.849979][T21049] ? memset+0x1f/0x40 [ 547.853965][T21049] ? fsnotify+0x1332/0x13f0 [ 547.858463][T21049] ? sock_poll+0x2f0/0x2f0 [ 547.862893][T21049] do_vfs_ioctl+0x76a/0x1720 [ 547.869045][T21049] ? selinux_file_ioctl+0x72f/0x990 [ 547.874241][T21049] ? ioctl_preallocate+0x250/0x250 [ 547.879348][T21049] ? __fget+0x37b/0x3c0 [ 547.883507][T21049] ? vfs_write+0x422/0x4e0 [ 547.887923][T21049] ? fget_many+0x20/0x20 [ 547.892166][T21049] ? debug_smp_processor_id+0x20/0x20 [ 547.897536][T21049] ? security_file_ioctl+0x9d/0xb0 [ 547.902656][T21049] __x64_sys_ioctl+0xd4/0x110 [ 547.907336][T21049] do_syscall_64+0xcb/0x1e0 [ 547.911842][T21049] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 547.917734][T21049] RIP: 0033:0x466459 [ 547.921624][T21049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 547.941221][T21049] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 547.949626][T21049] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 547.957595][T21049] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 547.965562][T21049] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 547.973527][T21049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 547.981494][T21049] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 548.043631][T21058] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000700900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xb00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:33 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x58030000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:33 executing program 0 (fault-call:8 fault-nth:76): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:33 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b19}, @mcast2}}) 21:32:33 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xc00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:33 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x5a010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 548.198448][T21075] xt_check_table_hooks: 1 callbacks suppressed [ 548.198455][T21075] x_tables: duplicate underflow at hook 2 [ 548.198521][T21076] xt_SECMARK: invalid mode: 0 [ 548.235809][T21078] xt_SECMARK: invalid mode: 0 [ 548.255112][T21073] FAULT_INJECTION: forcing a failure. [ 548.255112][T21073] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 548.270254][T21073] CPU: 0 PID: 21073 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 548.280531][T21073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.290581][T21073] Call Trace: [ 548.293873][T21073] dump_stack+0x1d8/0x24e [ 548.298196][T21073] ? devkmsg_release+0x11c/0x11c [ 548.303132][T21073] ? show_regs_print_info+0x12/0x12 [ 548.308325][T21073] should_fail+0x6f6/0x860 [ 548.312736][T21073] ? setup_fault_attr+0x3d0/0x3d0 [ 548.317749][T21073] ? stack_trace_save+0x120/0x1f0 [ 548.322766][T21073] __alloc_pages_nodemask+0x1c4/0x880 [ 548.328128][T21073] ? __kasan_kmalloc+0x137/0x1e0 [ 548.333066][T21073] ? __kernfs_create_file+0x45/0x260 [ 548.338349][T21073] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 548.343888][T21073] ? mutex_lock+0xa6/0x110 [ 548.348297][T21073] ? idr_get_free+0x740/0x900 [ 548.352966][T21073] ? mutex_unlock+0x19/0x40 [ 548.357463][T21073] alloc_slab_page+0x39/0x3e0 [ 548.362131][T21073] new_slab+0x97/0x460 [ 548.366193][T21073] ? selinux_path_notify+0x6c0/0x6c0 [ 548.371472][T21073] ? check_preemption_disabled+0x154/0x330 [ 548.377270][T21073] ___slab_alloc+0x330/0x4c0 [ 548.381859][T21073] ? _raw_spin_lock+0xa3/0x1b0 [ 548.386616][T21073] ? __kernfs_new_node+0xdb/0x6d0 [ 548.391637][T21073] ? __kernfs_new_node+0xdb/0x6d0 [ 548.396658][T21073] kmem_cache_alloc+0x18b/0x290 [ 548.401504][T21073] __kernfs_new_node+0xdb/0x6d0 [ 548.406356][T21073] ? mutex_lock+0xa6/0x110 [ 548.410766][T21073] ? kernfs_new_node+0x160/0x160 [ 548.415694][T21073] ? mutex_lock+0xa6/0x110 [ 548.420105][T21073] ? kernfs_activate+0x3fc/0x420 [ 548.425034][T21073] kernfs_new_node+0x95/0x160 [ 548.429703][T21073] __kernfs_create_file+0x45/0x260 [ 548.434806][T21073] sysfs_add_file_mode_ns+0x293/0x340 [ 548.440174][T21073] sysfs_merge_group+0x204/0x440 [ 548.445105][T21073] ? sysfs_remove_groups+0xb0/0xb0 [ 548.450210][T21073] ? sysfs_add_file_mode_ns+0x340/0x340 [ 548.455748][T21073] ? bus_add_device+0x92/0x3f0 [ 548.460516][T21073] dpm_sysfs_add+0xbd/0x260 [ 548.465014][T21073] device_add+0xde7/0x18a0 [ 548.469423][T21073] ? virtual_device_parent+0x50/0x50 [ 548.474727][T21073] ? pm_runtime_init+0x206/0x320 [ 548.479657][T21073] ? device_initialize+0x1d3/0x3e0 [ 548.484762][T21073] netdev_register_kobject+0x178/0x310 [ 548.490217][T21073] ? raw_notifier_call_chain+0xf2/0x110 [ 548.496021][T21073] register_netdevice+0xbc7/0x1480 [ 548.501131][T21073] ? netdev_update_lockdep_key+0x10/0x10 [ 548.506758][T21073] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 548.511778][T21073] ? __rcu_read_lock+0x50/0x50 [ 548.516534][T21073] ? alloc_netdev_mqs+0xa0c/0xc60 [ 548.521648][T21073] ? vti6_locate+0x551/0x910 [ 548.526215][T21073] vti6_locate+0x610/0x910 [ 548.530608][T21073] ? cap_capable+0x23f/0x280 [ 548.535176][T21073] ? vti6_link_config+0x530/0x530 [ 548.540180][T21073] ? vti6_ioctl+0xa64/0x1b10 [ 548.544744][T21073] vti6_ioctl+0xa88/0x1b10 [ 548.549136][T21073] ? vti6_tnl_xmit+0x1720/0x1720 [ 548.554065][T21073] ? __rcu_read_lock+0x50/0x50 [ 548.558806][T21073] ? check_preemption_disabled+0x154/0x330 [ 548.564585][T21073] ? avc_has_extended_perms+0xb5e/0x1140 [ 548.570197][T21073] ? full_name_hash+0xb4/0xe0 [ 548.575203][T21073] dev_ifsioc+0x675/0xa70 [ 548.579511][T21073] ? mutex_lock+0xa6/0x110 [ 548.583915][T21073] ? dev_ioctl+0xab0/0xab0 [ 548.588302][T21073] dev_ioctl+0x558/0xab0 [ 548.592515][T21073] sock_ioctl+0x677/0x760 [ 548.596817][T21073] ? sock_poll+0x2f0/0x2f0 [ 548.601207][T21073] ? memset+0x1f/0x40 [ 548.605166][T21073] ? fsnotify+0x1332/0x13f0 [ 548.609641][T21073] ? sock_poll+0x2f0/0x2f0 [ 548.614049][T21073] do_vfs_ioctl+0x76a/0x1720 [ 548.618612][T21073] ? selinux_file_ioctl+0x72f/0x990 [ 548.623780][T21073] ? ioctl_preallocate+0x250/0x250 [ 548.628866][T21073] ? __fget+0x37b/0x3c0 [ 548.633017][T21073] ? vfs_write+0x422/0x4e0 [ 548.637406][T21073] ? fget_many+0x20/0x20 [ 548.641709][T21073] ? debug_smp_processor_id+0x20/0x20 [ 548.647055][T21073] ? security_file_ioctl+0x9d/0xb0 [ 548.652138][T21073] __x64_sys_ioctl+0xd4/0x110 [ 548.656789][T21073] do_syscall_64+0xcb/0x1e0 [ 548.661277][T21073] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 548.667140][T21073] RIP: 0033:0x466459 [ 548.671008][T21073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 548.690584][T21073] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 548.698968][T21073] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:34 executing program 0 (fault-call:8 fault-nth:77): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:34 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, 0x0, 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:34 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1a}, @mcast2}}) 21:32:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xd00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 548.706914][T21073] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 548.714880][T21073] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 548.722825][T21073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 548.730775][T21073] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 548.783676][T21090] xt_SECMARK: invalid mode: 0 [ 548.786275][T21088] x_tables: duplicate underflow at hook 2 [ 548.809671][T21097] xt_SECMARK: invalid mode: 0 [ 548.826301][T21101] x_tables: duplicate underflow at hook 2 [ 548.832459][T21089] EXT4-fs (loop1): Can't read superblock on 2nd try [ 548.843447][T21092] FAULT_INJECTION: forcing a failure. [ 548.843447][T21092] name failslab, interval 1, probability 0, space 0, times 0 [ 548.846065][T21093] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 548.856266][T21092] CPU: 0 PID: 21092 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 548.875167][T21092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.885201][T21092] Call Trace: [ 548.888477][T21092] dump_stack+0x1d8/0x24e [ 548.892787][T21092] ? devkmsg_release+0x11c/0x11c [ 548.897719][T21092] ? show_regs_print_info+0x12/0x12 [ 548.902894][T21092] should_fail+0x6f6/0x860 [ 548.907285][T21092] ? setup_fault_attr+0x3d0/0x3d0 [ 548.912281][T21092] ? alloc_uevent_skb+0x73/0x220 [ 548.917214][T21092] should_failslab+0x5/0x20 [ 548.921690][T21092] __kmalloc_track_caller+0x5d/0x2e0 [ 548.926969][T21092] ? kmem_cache_alloc+0x115/0x290 [ 548.933278][T21092] ? alloc_uevent_skb+0x73/0x220 [ 548.938211][T21092] __alloc_skb+0xaf/0x4d0 [ 548.942536][T21092] alloc_uevent_skb+0x73/0x220 [ 548.947290][T21092] kobject_uevent_env+0x972/0x1040 [ 548.952377][T21092] device_add+0xf42/0x18a0 [ 548.956768][T21092] ? virtual_device_parent+0x50/0x50 [ 548.962035][T21092] ? pm_runtime_init+0x206/0x320 [ 548.966971][T21092] ? device_initialize+0x1d3/0x3e0 [ 548.972058][T21092] netdev_register_kobject+0x178/0x310 [ 548.977498][T21092] ? raw_notifier_call_chain+0xf2/0x110 [ 548.983021][T21092] register_netdevice+0xbc7/0x1480 [ 548.988111][T21092] ? netdev_update_lockdep_key+0x10/0x10 [ 548.993719][T21092] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 548.998718][T21092] ? __rcu_read_lock+0x50/0x50 [ 549.003456][T21092] ? alloc_netdev_mqs+0xa0c/0xc60 [ 549.008453][T21092] ? vti6_locate+0x551/0x910 [ 549.013020][T21092] vti6_locate+0x610/0x910 [ 549.017413][T21092] ? cap_capable+0x23f/0x280 [ 549.021975][T21092] ? vti6_link_config+0x530/0x530 [ 549.026973][T21092] ? vti6_ioctl+0xa64/0x1b10 [ 549.031536][T21092] vti6_ioctl+0xa88/0x1b10 [ 549.035943][T21092] ? vti6_tnl_xmit+0x1720/0x1720 [ 549.040880][T21092] ? __rcu_read_lock+0x50/0x50 [ 549.045626][T21092] ? check_preemption_disabled+0x154/0x330 [ 549.051468][T21092] ? avc_has_extended_perms+0xb5e/0x1140 [ 549.057148][T21092] ? full_name_hash+0xb4/0xe0 [ 549.061826][T21092] dev_ifsioc+0x675/0xa70 [ 549.066136][T21092] ? mutex_lock+0xa6/0x110 [ 549.070528][T21092] ? dev_ioctl+0xab0/0xab0 [ 549.075020][T21092] dev_ioctl+0x558/0xab0 [ 549.079242][T21092] sock_ioctl+0x677/0x760 [ 549.083562][T21092] ? sock_poll+0x2f0/0x2f0 [ 549.087950][T21092] ? memset+0x1f/0x40 [ 549.091902][T21092] ? fsnotify+0x1332/0x13f0 [ 549.096380][T21092] ? sock_poll+0x2f0/0x2f0 [ 549.100782][T21092] do_vfs_ioctl+0x76a/0x1720 [ 549.105375][T21092] ? selinux_file_ioctl+0x72f/0x990 [ 549.110547][T21092] ? ioctl_preallocate+0x250/0x250 [ 549.115647][T21092] ? __fget+0x37b/0x3c0 [ 549.119776][T21092] ? vfs_write+0x422/0x4e0 [ 549.124165][T21092] ? fget_many+0x20/0x20 [ 549.128381][T21092] ? debug_smp_processor_id+0x20/0x20 [ 549.133793][T21092] ? security_file_ioctl+0x9d/0xb0 [ 549.138890][T21092] __x64_sys_ioctl+0xd4/0x110 [ 549.143656][T21092] do_syscall_64+0xcb/0x1e0 [ 549.148159][T21092] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 549.154030][T21092] RIP: 0033:0x466459 [ 549.157928][T21092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 21:32:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000800900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:34 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x60000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xe00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:34 executing program 0 (fault-call:8 fault-nth:78): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:34 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1b}, @mcast2}}) 21:32:34 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, 0x0, 0x0, 0x80061, 0x0) fdatasync(r0) [ 549.177507][T21092] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 549.185891][T21092] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 549.193837][T21092] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 549.201802][T21092] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 549.209867][T21092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 549.217817][T21092] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x1100], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:34 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x65020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:34 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x68000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 549.250440][T21089] EXT4-fs (loop1): Can't read superblock on 2nd try [ 549.280435][T21106] x_tables: duplicate underflow at hook 2 [ 549.286583][T21109] xt_SECMARK: invalid mode: 0 [ 549.294364][T21113] xt_SECMARK: invalid mode: 0 21:32:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x1200], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 549.334684][T21117] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 549.343907][T21119] x_tables: duplicate underflow at hook 2 [ 549.350695][T21126] FAULT_INJECTION: forcing a failure. [ 549.350695][T21126] name failslab, interval 1, probability 0, space 0, times 0 [ 549.367239][T21126] CPU: 1 PID: 21126 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 21:32:34 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, 0x0, 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x2000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 549.377485][T21126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.387540][T21126] Call Trace: [ 549.390832][T21126] dump_stack+0x1d8/0x24e [ 549.395148][T21126] ? devkmsg_release+0x11c/0x11c [ 549.400082][T21126] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 549.406235][T21126] ? show_regs_print_info+0x12/0x12 [ 549.411431][T21126] ? refcount_inc_checked+0x50/0x50 [ 549.416628][T21126] ? refcount_inc_checked+0x1a/0x50 [ 549.418550][T21131] x_tables: duplicate underflow at hook 2 [ 549.421838][T21126] should_fail+0x6f6/0x860 [ 549.421848][T21126] ? setup_fault_attr+0x3d0/0x3d0 [ 549.421856][T21126] ? device_add+0x5d8/0x18a0 [ 549.421875][T21126] ? kset_create_and_add+0x55/0x2a0 [ 549.446744][T21126] should_failslab+0x5/0x20 [ 549.451371][T21126] kmem_cache_alloc_trace+0x39/0x2b0 [ 549.453884][T21134] x_tables: duplicate underflow at hook 2 [ 549.456653][T21126] ? virtual_device_parent+0x50/0x50 [ 549.456666][T21126] kset_create_and_add+0x55/0x2a0 [ 549.456684][T21126] netdev_register_kobject+0x1a2/0x310 [ 549.478136][T21126] ? raw_notifier_call_chain+0xf2/0x110 [ 549.483667][T21126] register_netdevice+0xbc7/0x1480 [ 549.488771][T21126] ? netdev_update_lockdep_key+0x10/0x10 [ 549.494398][T21126] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 549.499413][T21126] ? __rcu_read_lock+0x50/0x50 [ 549.504159][T21126] ? alloc_netdev_mqs+0xa0c/0xc60 [ 549.509265][T21126] ? vti6_locate+0x551/0x910 [ 549.513841][T21126] vti6_locate+0x610/0x910 [ 549.518243][T21126] ? cap_capable+0x23f/0x280 [ 549.522808][T21126] ? vti6_link_config+0x530/0x530 [ 549.527817][T21126] ? vti6_ioctl+0xa64/0x1b10 [ 549.532392][T21126] vti6_ioctl+0xa88/0x1b10 [ 549.536817][T21126] ? vti6_tnl_xmit+0x1720/0x1720 [ 549.541741][T21126] ? avc_has_extended_perms+0xb5e/0x1140 [ 549.547355][T21126] ? full_name_hash+0xb4/0xe0 [ 549.552019][T21126] dev_ifsioc+0x675/0xa70 [ 549.556335][T21126] ? mutex_lock+0xa6/0x110 [ 549.560736][T21126] ? dev_ioctl+0xab0/0xab0 [ 549.565218][T21126] dev_ioctl+0x558/0xab0 [ 549.569439][T21126] sock_ioctl+0x677/0x760 [ 549.573749][T21126] ? sock_poll+0x2f0/0x2f0 [ 549.578166][T21126] ? memset+0x1f/0x40 [ 549.582128][T21126] ? fsnotify+0x1332/0x13f0 [ 549.586612][T21126] ? sock_poll+0x2f0/0x2f0 [ 549.591011][T21126] do_vfs_ioctl+0x76a/0x1720 [ 549.595581][T21126] ? selinux_file_ioctl+0x72f/0x990 [ 549.600758][T21126] ? ioctl_preallocate+0x250/0x250 [ 549.605864][T21126] ? __fget+0x37b/0x3c0 [ 549.610003][T21126] ? vfs_write+0x422/0x4e0 [ 549.614403][T21126] ? fget_many+0x20/0x20 [ 549.618644][T21126] ? debug_smp_processor_id+0x20/0x20 [ 549.623999][T21126] ? security_file_ioctl+0x9d/0xb0 [ 549.629089][T21126] __x64_sys_ioctl+0xd4/0x110 [ 549.633746][T21126] do_syscall_64+0xcb/0x1e0 [ 549.638246][T21126] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 549.644120][T21126] RIP: 0033:0x466459 [ 549.647991][T21126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 549.667572][T21126] RSP: 002b:00007faa9aa7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 549.675965][T21126] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 549.683924][T21126] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 549.691891][T21126] RBP: 00007faa9aa7f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 549.699841][T21126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 549.707810][T21126] R13: 00007ffe4ada44ff R14: 00007faa9aa7f300 R15: 0000000000022000 [ 549.718626][T21125] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000900900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:35 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1c}, @mcast2}}) 21:32:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x2500], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:35 executing program 0 (fault-call:8 fault-nth:79): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) fdatasync(r0) 21:32:35 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x6c000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 549.784403][T21125] EXT4-fs (loop1): Can't read superblock on 2nd try [ 549.792656][T21136] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 21:32:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 549.868552][T21155] x_tables: duplicate underflow at hook 2 [ 549.871524][T21156] FAULT_INJECTION: forcing a failure. [ 549.871524][T21156] name failslab, interval 1, probability 0, space 0, times 0 [ 549.887599][T21156] CPU: 0 PID: 21156 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 549.897842][T21156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.907894][T21156] Call Trace: [ 549.911199][T21156] dump_stack+0x1d8/0x24e [ 549.918953][T21156] ? devkmsg_release+0x11c/0x11c [ 549.923878][T21156] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 549.930022][T21156] ? show_regs_print_info+0x12/0x12 [ 549.935205][T21156] ? refcount_inc_checked+0x50/0x50 [ 549.940521][T21156] ? refcount_inc_checked+0x1a/0x50 [ 549.946246][T21156] should_fail+0x6f6/0x860 [ 549.950643][T21156] ? setup_fault_attr+0x3d0/0x3d0 [ 549.955642][T21156] ? device_add+0x5d8/0x18a0 [ 549.960207][T21156] ? kset_create_and_add+0x55/0x2a0 [ 549.965377][T21156] should_failslab+0x5/0x20 [ 549.969856][T21156] kmem_cache_alloc_trace+0x39/0x2b0 [ 549.975113][T21156] ? virtual_device_parent+0x50/0x50 [ 549.980380][T21156] kset_create_and_add+0x55/0x2a0 [ 549.985378][T21156] netdev_register_kobject+0x1a2/0x310 [ 549.990830][T21156] ? raw_notifier_call_chain+0xf2/0x110 [ 549.996348][T21156] register_netdevice+0xbc7/0x1480 [ 550.001433][T21156] ? netdev_update_lockdep_key+0x10/0x10 [ 550.007038][T21156] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 550.012035][T21156] ? __rcu_read_lock+0x50/0x50 [ 550.016769][T21156] ? alloc_netdev_mqs+0xa0c/0xc60 [ 550.021766][T21156] ? vti6_locate+0x551/0x910 [ 550.026329][T21156] vti6_locate+0x610/0x910 [ 550.030722][T21156] ? cap_capable+0x23f/0x280 [ 550.035285][T21156] ? vti6_link_config+0x530/0x530 [ 550.040280][T21156] ? vti6_ioctl+0xa64/0x1b10 [ 550.044840][T21156] vti6_ioctl+0xa88/0x1b10 [ 550.049247][T21156] ? vti6_tnl_xmit+0x1720/0x1720 [ 550.054157][T21156] ? __rcu_read_lock+0x50/0x50 [ 550.058891][T21156] ? check_preemption_disabled+0x154/0x330 [ 550.064671][T21156] ? avc_has_extended_perms+0xb5e/0x1140 [ 550.070295][T21156] ? full_name_hash+0xb4/0xe0 [ 550.074961][T21156] dev_ifsioc+0x675/0xa70 [ 550.079269][T21156] ? mutex_lock+0xa6/0x110 [ 550.083658][T21156] ? dev_ioctl+0xab0/0xab0 [ 550.088049][T21156] dev_ioctl+0x558/0xab0 [ 550.092274][T21156] sock_ioctl+0x677/0x760 [ 550.096575][T21156] ? sock_poll+0x2f0/0x2f0 [ 550.100961][T21156] ? memset+0x1f/0x40 [ 550.104915][T21156] ? fsnotify+0x1332/0x13f0 [ 550.109391][T21156] ? sock_poll+0x2f0/0x2f0 [ 550.113780][T21156] do_vfs_ioctl+0x76a/0x1720 [ 550.118341][T21156] ? selinux_file_ioctl+0x72f/0x990 [ 550.123511][T21156] ? ioctl_preallocate+0x250/0x250 [ 550.128598][T21156] ? __fget+0x37b/0x3c0 [ 550.132729][T21156] ? vfs_write+0x422/0x4e0 [ 550.137121][T21156] ? fget_many+0x20/0x20 [ 550.141337][T21156] ? debug_smp_processor_id+0x20/0x20 [ 550.146684][T21156] ? security_file_ioctl+0x9d/0xb0 [ 550.151768][T21156] __x64_sys_ioctl+0xd4/0x110 [ 550.156458][T21156] do_syscall_64+0xcb/0x1e0 [ 550.160946][T21156] entry_SYSCALL_64_after_hwframe+0x44/0xa9 21:32:35 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x71000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 550.166875][T21156] RIP: 0033:0x466459 [ 550.170748][T21156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 550.190331][T21156] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 550.198715][T21156] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 550.206669][T21156] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) fdatasync(r0) 21:32:35 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x74000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4800], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:35 executing program 0 (fault-call:8 fault-nth:80): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 550.214616][T21156] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 550.222565][T21156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 550.230512][T21156] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 550.241071][T21153] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 550.251203][T21151] EXT4-fs (loop1): Can't read superblock on 2nd try [ 550.263454][T21164] x_tables: duplicate underflow at hook 2 [ 550.299978][T21151] EXT4-fs (loop1): Can't read superblock on 2nd try [ 550.321508][T21176] x_tables: duplicate underflow at hook 2 [ 550.333812][T21175] FAULT_INJECTION: forcing a failure. [ 550.333812][T21175] name failslab, interval 1, probability 0, space 0, times 0 [ 550.347849][T21175] CPU: 0 PID: 21175 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 550.358107][T21175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.368143][T21175] Call Trace: [ 550.371444][T21175] dump_stack+0x1d8/0x24e [ 550.375758][T21175] ? devkmsg_release+0x11c/0x11c [ 550.380695][T21175] ? show_regs_print_info+0x12/0x12 [ 550.385873][T21175] should_fail+0x6f6/0x860 [ 550.390272][T21175] ? setup_fault_attr+0x3d0/0x3d0 [ 550.395277][T21175] ? kobject_set_name_vargs+0x5d/0x110 [ 550.400712][T21175] should_failslab+0x5/0x20 [ 550.405292][T21175] __kmalloc_track_caller+0x5d/0x2e0 [ 550.410676][T21175] kvasprintf+0xd6/0x180 [ 550.414897][T21175] ? asan.module_ctor+0x10/0x10 [ 550.419769][T21175] ? mutex_unlock+0x19/0x40 [ 550.424262][T21175] ? kernfs_add_one+0x49e/0x5c0 [ 550.429089][T21175] ? kvasprintf_const+0x4d/0x170 [ 550.434008][T21175] kobject_set_name_vargs+0x5d/0x110 [ 550.439292][T21175] kobject_init_and_add+0xdb/0x190 [ 550.444388][T21175] ? kobject_add+0x210/0x210 [ 550.448952][T21175] ? kobject_uevent_env+0x2bd/0x1040 [ 550.454221][T21175] ? kernfs_get+0x55/0x90 [ 550.458534][T21175] net_rx_queue_update_kobjects+0x174/0x460 [ 550.464407][T21175] netdev_register_kobject+0x222/0x310 [ 550.469847][T21175] register_netdevice+0xbc7/0x1480 [ 550.474949][T21175] ? netdev_update_lockdep_key+0x10/0x10 [ 550.480559][T21175] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 550.485570][T21175] ? __rcu_read_lock+0x50/0x50 [ 550.490319][T21175] ? alloc_netdev_mqs+0xa0c/0xc60 [ 550.495324][T21175] ? vti6_locate+0x551/0x910 [ 550.499891][T21175] vti6_locate+0x610/0x910 [ 550.504286][T21175] ? cap_capable+0x23f/0x280 [ 550.508879][T21175] ? vti6_link_config+0x530/0x530 [ 550.513887][T21175] ? vti6_ioctl+0xa64/0x1b10 [ 550.518456][T21175] vti6_ioctl+0xa88/0x1b10 [ 550.522850][T21175] ? vti6_tnl_xmit+0x1720/0x1720 [ 550.527776][T21175] ? __rcu_read_lock+0x50/0x50 [ 550.532515][T21175] ? check_preemption_disabled+0x154/0x330 [ 550.538299][T21175] ? avc_has_extended_perms+0xb5e/0x1140 [ 550.543919][T21175] ? full_name_hash+0xb4/0xe0 [ 550.548588][T21175] dev_ifsioc+0x675/0xa70 [ 550.552903][T21175] ? mutex_lock+0xa6/0x110 [ 550.557294][T21175] ? dev_ioctl+0xab0/0xab0 [ 550.561689][T21175] dev_ioctl+0x558/0xab0 [ 550.565910][T21175] sock_ioctl+0x677/0x760 [ 550.570235][T21175] ? sock_poll+0x2f0/0x2f0 [ 550.574635][T21175] ? memset+0x1f/0x40 [ 550.578719][T21175] ? fsnotify+0x1332/0x13f0 [ 550.583205][T21175] ? sock_poll+0x2f0/0x2f0 [ 550.587602][T21175] do_vfs_ioctl+0x76a/0x1720 [ 550.592172][T21175] ? selinux_file_ioctl+0x72f/0x990 [ 550.597345][T21175] ? ioctl_preallocate+0x250/0x250 [ 550.602436][T21175] ? __fget+0x37b/0x3c0 [ 550.606571][T21175] ? vfs_write+0x422/0x4e0 [ 550.610971][T21175] ? fget_many+0x20/0x20 [ 550.615196][T21175] ? debug_smp_processor_id+0x20/0x20 [ 550.620571][T21175] ? security_file_ioctl+0x9d/0xb0 [ 550.625661][T21175] __x64_sys_ioctl+0xd4/0x110 [ 550.630315][T21175] do_syscall_64+0xcb/0x1e0 [ 550.634803][T21175] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 550.640689][T21175] RIP: 0033:0x466459 [ 550.645512][T21175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 550.665092][T21175] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 550.673484][T21175] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 550.681456][T21175] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 550.689499][T21175] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 21:32:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000a00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:35 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1d}, @mcast2}}) 21:32:35 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x74fd0100], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4c00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:35 executing program 0 (fault-call:8 fault-nth:81): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000b00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 550.697449][T21175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 550.705421][T21175] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 550.715667][T21175] kobject: can not set name properly! 21:32:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:36 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x7a000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 550.755459][T21184] EXT4-fs (loop1): Can't read superblock on 2nd try [ 550.763381][T21172] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 550.796230][T21190] FAULT_INJECTION: forcing a failure. [ 550.796230][T21190] name failslab, interval 1, probability 0, space 0, times 0 [ 550.809760][T21190] CPU: 1 PID: 21190 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 550.819992][T21190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.830032][T21190] Call Trace: [ 550.833343][T21190] dump_stack+0x1d8/0x24e [ 550.837667][T21190] ? devkmsg_release+0x11c/0x11c [ 550.842593][T21190] ? show_regs_print_info+0x12/0x12 [ 550.847772][T21190] ? __kasan_kmalloc+0x1a3/0x1e0 [ 550.852693][T21190] should_fail+0x6f6/0x860 [ 550.857113][T21190] ? setup_fault_attr+0x3d0/0x3d0 [ 550.862125][T21190] ? __kasan_kmalloc+0x137/0x1e0 [ 550.867056][T21190] ? __kmalloc_track_caller+0x13a/0x2e0 [ 550.872595][T21190] ? kobject_set_name_vargs+0x5d/0x110 [ 550.878059][T21190] ? __kernfs_new_node+0x99/0x6d0 [ 550.883086][T21190] should_failslab+0x5/0x20 [ 550.887602][T21190] __kmalloc_track_caller+0x5d/0x2e0 [ 550.892878][T21190] ? __x64_sys_ioctl+0xd4/0x110 [ 550.897728][T21190] ? do_syscall_64+0xcb/0x1e0 [ 550.902434][T21190] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 550.908502][T21190] kstrdup_const+0x51/0x90 [ 550.912953][T21190] __kernfs_new_node+0x99/0x6d0 [ 550.917797][T21190] ? kernfs_new_node+0x160/0x160 [ 550.922724][T21190] ? vsnprintf+0x1e4/0x1d60 [ 550.927206][T21190] ? make_kgid+0x24f/0x390 [ 550.931616][T21190] ? from_kuid_munged+0x3b0/0x3b0 [ 550.936617][T21190] kernfs_create_dir_ns+0x90/0x220 [ 550.941704][T21190] sysfs_create_dir_ns+0x181/0x390 [ 550.946789][T21190] ? sysfs_warn_dup+0xa0/0xa0 [ 550.951477][T21190] ? mutex_unlock+0x19/0x40 [ 550.955957][T21190] kobject_add_internal+0x595/0xbd0 [ 550.961131][T21190] kobject_init_and_add+0x123/0x190 [ 550.966305][T21190] ? kobject_add+0x210/0x210 [ 550.970869][T21190] ? kobject_uevent_env+0x2bd/0x1040 [ 550.976144][T21190] ? kernfs_get+0x55/0x90 [ 550.980448][T21190] net_rx_queue_update_kobjects+0x174/0x460 [ 550.986314][T21190] netdev_register_kobject+0x222/0x310 [ 550.991752][T21190] register_netdevice+0xbc7/0x1480 [ 550.996839][T21190] ? netdev_update_lockdep_key+0x10/0x10 [ 551.002445][T21190] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 551.007445][T21190] ? __rcu_read_lock+0x50/0x50 [ 551.012182][T21190] ? alloc_netdev_mqs+0xa0c/0xc60 [ 551.017179][T21190] ? vti6_locate+0x551/0x910 [ 551.021738][T21190] vti6_locate+0x610/0x910 [ 551.026127][T21190] ? cap_capable+0x23f/0x280 [ 551.030691][T21190] ? vti6_link_config+0x530/0x530 [ 551.035689][T21190] ? vti6_ioctl+0xa64/0x1b10 [ 551.040251][T21190] vti6_ioctl+0xa88/0x1b10 [ 551.044640][T21190] ? vti6_tnl_xmit+0x1720/0x1720 [ 551.049552][T21190] ? __rcu_read_lock+0x50/0x50 [ 551.054291][T21190] ? check_preemption_disabled+0x154/0x330 [ 551.060070][T21190] ? avc_has_extended_perms+0xb5e/0x1140 [ 551.065676][T21190] ? full_name_hash+0xb4/0xe0 [ 551.070330][T21190] dev_ifsioc+0x675/0xa70 [ 551.074670][T21190] ? mutex_lock+0xa6/0x110 [ 551.079086][T21190] ? dev_ioctl+0xab0/0xab0 [ 551.083484][T21190] dev_ioctl+0x558/0xab0 [ 551.087708][T21190] sock_ioctl+0x677/0x760 [ 551.092009][T21190] ? sock_poll+0x2f0/0x2f0 [ 551.096398][T21190] ? memset+0x1f/0x40 [ 551.100354][T21190] ? fsnotify+0x1332/0x13f0 [ 551.104826][T21190] ? sock_poll+0x2f0/0x2f0 [ 551.109217][T21190] do_vfs_ioctl+0x76a/0x1720 [ 551.113784][T21190] ? selinux_file_ioctl+0x72f/0x990 [ 551.118955][T21190] ? ioctl_preallocate+0x250/0x250 [ 551.124039][T21190] ? __fget+0x37b/0x3c0 [ 551.128168][T21190] ? vfs_write+0x422/0x4e0 [ 551.132558][T21190] ? fget_many+0x20/0x20 [ 551.136776][T21190] ? debug_smp_processor_id+0x20/0x20 [ 551.142119][T21190] ? security_file_ioctl+0x9d/0xb0 [ 551.147225][T21190] __x64_sys_ioctl+0xd4/0x110 [ 551.151874][T21190] do_syscall_64+0xcb/0x1e0 [ 551.156352][T21190] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 551.162233][T21190] RIP: 0033:0x466459 [ 551.166117][T21190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 551.185696][T21190] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:32:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) fdatasync(r0) 21:32:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6800], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 551.194081][T21190] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 551.202025][T21190] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 551.209988][T21190] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 551.217934][T21190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 551.225878][T21190] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:36 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1e}, @mcast2}}) 21:32:36 executing program 0 (fault-call:8 fault-nth:82): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:36 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x7f010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000c00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 551.251240][T21194] EXT4-fs (loop1): Can't read superblock on 2nd try [ 551.260683][T21190] kobject_add_internal failed for rx-0 (error: -12 parent: queues) 21:32:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6c00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 551.292467][T21201] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 551.311127][T21208] FAULT_INJECTION: forcing a failure. [ 551.311127][T21208] name failslab, interval 1, probability 0, space 0, times 0 [ 551.325781][T21208] CPU: 0 PID: 21208 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 551.336040][T21208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.346092][T21208] Call Trace: [ 551.349386][T21208] dump_stack+0x1d8/0x24e [ 551.353804][T21208] ? devkmsg_release+0x11c/0x11c [ 551.358721][T21208] ? show_regs_print_info+0x12/0x12 [ 551.363907][T21208] should_fail+0x6f6/0x860 [ 551.368322][T21208] ? setup_fault_attr+0x3d0/0x3d0 [ 551.373344][T21208] ? __kernfs_new_node+0xdb/0x6d0 [ 551.378365][T21208] should_failslab+0x5/0x20 [ 551.382869][T21208] kmem_cache_alloc+0x36/0x290 [ 551.387630][T21208] ? memcpy+0x38/0x50 [ 551.391607][T21208] __kernfs_new_node+0xdb/0x6d0 [ 551.396451][T21208] ? kernfs_new_node+0x160/0x160 [ 551.401379][T21208] ? vsnprintf+0x1e4/0x1d60 [ 551.405865][T21208] ? make_kgid+0x24f/0x390 [ 551.410262][T21208] ? from_kuid_munged+0x3b0/0x3b0 [ 551.415269][T21208] kernfs_create_dir_ns+0x90/0x220 [ 551.420354][T21208] sysfs_create_dir_ns+0x181/0x390 [ 551.425436][T21208] ? sysfs_warn_dup+0xa0/0xa0 [ 551.430086][T21208] ? mutex_unlock+0x19/0x40 [ 551.434561][T21208] kobject_add_internal+0x595/0xbd0 [ 551.439731][T21208] kobject_init_and_add+0x123/0x190 [ 551.444902][T21208] ? kobject_add+0x210/0x210 [ 551.449986][T21208] ? kobject_uevent_env+0x2bd/0x1040 [ 551.455675][T21208] ? kernfs_get+0x55/0x90 [ 551.459982][T21208] net_rx_queue_update_kobjects+0x174/0x460 [ 551.465848][T21208] netdev_register_kobject+0x222/0x310 [ 551.471278][T21208] register_netdevice+0xbc7/0x1480 [ 551.476362][T21208] ? netdev_update_lockdep_key+0x10/0x10 [ 551.481969][T21208] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 551.486965][T21208] ? __rcu_read_lock+0x50/0x50 [ 551.491719][T21208] ? alloc_netdev_mqs+0xa0c/0xc60 [ 551.496716][T21208] ? vti6_locate+0x551/0x910 [ 551.501277][T21208] vti6_locate+0x610/0x910 [ 551.505667][T21208] ? cap_capable+0x23f/0x280 [ 551.510232][T21208] ? vti6_link_config+0x530/0x530 [ 551.515225][T21208] ? vti6_ioctl+0xa64/0x1b10 [ 551.519786][T21208] vti6_ioctl+0xa88/0x1b10 [ 551.524205][T21208] ? vti6_tnl_xmit+0x1720/0x1720 [ 551.529222][T21208] ? __rcu_read_lock+0x50/0x50 [ 551.533964][T21208] ? check_preemption_disabled+0x154/0x330 [ 551.539744][T21208] ? avc_has_extended_perms+0xb5e/0x1140 [ 551.545521][T21208] ? full_name_hash+0xb4/0xe0 [ 551.550177][T21208] dev_ifsioc+0x675/0xa70 [ 551.554479][T21208] ? mutex_lock+0xa6/0x110 [ 551.558866][T21208] ? dev_ioctl+0xab0/0xab0 [ 551.563257][T21208] dev_ioctl+0x558/0xab0 [ 551.567469][T21208] sock_ioctl+0x677/0x760 [ 551.571770][T21208] ? sock_poll+0x2f0/0x2f0 [ 551.576162][T21208] ? memset+0x1f/0x40 [ 551.580116][T21208] ? fsnotify+0x1332/0x13f0 [ 551.584590][T21208] ? sock_poll+0x2f0/0x2f0 [ 551.588980][T21208] do_vfs_ioctl+0x76a/0x1720 [ 551.593540][T21208] ? selinux_file_ioctl+0x72f/0x990 [ 551.598712][T21208] ? ioctl_preallocate+0x250/0x250 [ 551.603796][T21208] ? __fget+0x37b/0x3c0 [ 551.607923][T21208] ? vfs_write+0x422/0x4e0 [ 551.612423][T21208] ? fget_many+0x20/0x20 [ 551.616639][T21208] ? debug_smp_processor_id+0x20/0x20 [ 551.621985][T21208] ? security_file_ioctl+0x9d/0xb0 [ 551.627764][T21208] __x64_sys_ioctl+0xd4/0x110 [ 551.632415][T21208] do_syscall_64+0xcb/0x1e0 [ 551.636892][T21208] entry_SYSCALL_64_after_hwframe+0x44/0xa9 21:32:36 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x8c020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 551.642929][T21208] RIP: 0033:0x466459 [ 551.646795][T21208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 551.666385][T21208] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 551.674767][T21208] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 551.682711][T21208] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(0xffffffffffffffff) 21:32:37 executing program 0 (fault-call:8 fault-nth:83): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7400], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 551.690656][T21208] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 551.698607][T21208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 551.706549][T21208] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 551.715923][T21208] kobject_add_internal failed for rx-0 (error: -12 parent: queues) 21:32:37 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x8e020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 551.742844][T21213] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7a00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xa004], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 551.766999][T21224] FAULT_INJECTION: forcing a failure. [ 551.766999][T21224] name failslab, interval 1, probability 0, space 0, times 0 [ 551.781074][T21224] CPU: 1 PID: 21224 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 551.791369][T21224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.801415][T21224] Call Trace: [ 551.804707][T21224] dump_stack+0x1d8/0x24e [ 551.809036][T21224] ? devkmsg_release+0x11c/0x11c [ 551.813973][T21224] ? show_regs_print_info+0x12/0x12 [ 551.819174][T21224] ? __kasan_kmalloc+0x1a3/0x1e0 [ 551.824211][T21224] ? kmem_cache_alloc+0x115/0x290 [ 551.829236][T21224] ? __kernfs_new_node+0xdb/0x6d0 [ 551.834261][T21224] ? kernfs_create_dir_ns+0x90/0x220 [ 551.839545][T21224] ? sysfs_create_dir_ns+0x181/0x390 [ 551.844832][T21224] should_fail+0x6f6/0x860 [ 551.849254][T21224] ? setup_fault_attr+0x3d0/0x3d0 [ 551.854280][T21224] ? mutex_unlock+0x19/0x40 [ 551.858778][T21224] ? __kernfs_new_node+0xdb/0x6d0 [ 551.863783][T21224] should_failslab+0x5/0x20 [ 551.868270][T21224] kmem_cache_alloc+0x36/0x290 [ 551.873030][T21224] __kernfs_new_node+0xdb/0x6d0 [ 551.877861][T21224] ? kernfs_new_node+0x160/0x160 [ 551.882778][T21224] ? _raw_spin_lock+0xa3/0x1b0 [ 551.887606][T21224] ? security_kernfs_init_security+0x9a/0xb0 [ 551.893584][T21224] kernfs_new_node+0x95/0x160 [ 551.898247][T21224] __kernfs_create_file+0x45/0x260 [ 551.903348][T21224] sysfs_add_file_mode_ns+0x293/0x340 [ 551.908713][T21224] internal_create_group+0x560/0xf10 [ 551.913988][T21224] ? sysfs_create_dir_ns+0x181/0x390 [ 551.919262][T21224] ? sysfs_create_dir_ns+0x1c7/0x390 [ 551.924535][T21224] ? sysfs_create_group+0x20/0x20 [ 551.929543][T21224] sysfs_create_groups+0x5d/0x130 [ 551.934568][T21224] kobject_add_internal+0x708/0xbd0 [ 551.939769][T21224] kobject_init_and_add+0x123/0x190 [ 551.944955][T21224] ? kobject_add+0x210/0x210 [ 551.949531][T21224] ? kobject_uevent_env+0x2bd/0x1040 [ 551.954818][T21224] ? kernfs_get+0x55/0x90 [ 551.959153][T21224] net_rx_queue_update_kobjects+0x174/0x460 [ 551.965032][T21224] netdev_register_kobject+0x222/0x310 [ 551.970485][T21224] register_netdevice+0xbc7/0x1480 [ 551.975586][T21224] ? netdev_update_lockdep_key+0x10/0x10 [ 551.981200][T21224] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 551.986211][T21224] ? __rcu_read_lock+0x50/0x50 [ 551.990964][T21224] ? alloc_netdev_mqs+0xa0c/0xc60 [ 551.995971][T21224] ? vti6_locate+0x551/0x910 [ 552.000537][T21224] vti6_locate+0x610/0x910 [ 552.004949][T21224] ? cap_capable+0x23f/0x280 [ 552.009547][T21224] ? vti6_link_config+0x530/0x530 [ 552.014560][T21224] ? vti6_ioctl+0xa64/0x1b10 [ 552.019131][T21224] vti6_ioctl+0xa88/0x1b10 [ 552.023528][T21224] ? vti6_tnl_xmit+0x1720/0x1720 [ 552.028443][T21224] ? __rcu_read_lock+0x50/0x50 [ 552.033183][T21224] ? check_preemption_disabled+0x154/0x330 [ 552.038969][T21224] ? avc_has_extended_perms+0xb5e/0x1140 [ 552.044586][T21224] ? full_name_hash+0xb4/0xe0 [ 552.049248][T21224] dev_ifsioc+0x675/0xa70 [ 552.053702][T21224] ? mutex_lock+0xa6/0x110 [ 552.058105][T21224] ? dev_ioctl+0xab0/0xab0 [ 552.062507][T21224] dev_ioctl+0x558/0xab0 [ 552.066755][T21224] sock_ioctl+0x677/0x760 [ 552.071065][T21224] ? sock_poll+0x2f0/0x2f0 [ 552.075459][T21224] ? memset+0x1f/0x40 [ 552.079428][T21224] ? fsnotify+0x1332/0x13f0 [ 552.083911][T21224] ? sock_poll+0x2f0/0x2f0 [ 552.088320][T21224] do_vfs_ioctl+0x76a/0x1720 [ 552.092896][T21224] ? selinux_file_ioctl+0x72f/0x990 [ 552.098070][T21224] ? ioctl_preallocate+0x250/0x250 [ 552.103167][T21224] ? __fget+0x37b/0x3c0 [ 552.107316][T21224] ? vfs_write+0x422/0x4e0 [ 552.111723][T21224] ? fget_many+0x20/0x20 [ 552.115945][T21224] ? debug_smp_processor_id+0x20/0x20 [ 552.121312][T21224] ? security_file_ioctl+0x9d/0xb0 [ 552.126400][T21224] __x64_sys_ioctl+0xd4/0x110 [ 552.131155][T21224] do_syscall_64+0xcb/0x1e0 [ 552.135650][T21224] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 552.141532][T21224] RIP: 0033:0x466459 [ 552.145407][T21224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 552.164991][T21224] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 552.173377][T21224] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 552.181335][T21224] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 552.189290][T21224] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 552.197242][T21224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 552.205295][T21224] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:37 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1f}, @mcast2}}) 21:32:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xc005], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:37 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x9a020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:37 executing program 0 (fault-call:8 fault-nth:84): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000d00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 552.224968][T21236] secmark_tg_check: 16 callbacks suppressed [ 552.224973][T21236] xt_SECMARK: invalid mode: 0 [ 552.239288][T21224] kobject_add_internal failed for rx-0 (error: -12 parent: queues) [ 552.244103][T21239] xt_SECMARK: invalid mode: 0 21:32:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xf801], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 552.273458][T21234] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 552.312471][T21234] EXT4-fs (loop2): re-mounted. Opts: (null) [ 552.320044][T21249] EXT4-fs (loop1): Can't read superblock on 2nd try [ 552.321626][T21244] FAULT_INJECTION: forcing a failure. [ 552.321626][T21244] name failslab, interval 1, probability 0, space 0, times 0 [ 552.333106][T21246] xt_SECMARK: invalid mode: 0 [ 552.343673][T21244] CPU: 0 PID: 21244 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 552.354254][T21244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.362262][T21255] xt_SECMARK: invalid mode: 0 [ 552.364297][T21244] Call Trace: [ 552.364317][T21244] dump_stack+0x1d8/0x24e [ 552.364336][T21244] ? devkmsg_release+0x11c/0x11c [ 552.381489][T21244] ? show_regs_print_info+0x12/0x12 [ 552.386671][T21244] should_fail+0x6f6/0x860 [ 552.391070][T21244] ? setup_fault_attr+0x3d0/0x3d0 [ 552.396072][T21244] ? __kernfs_new_node+0xdb/0x6d0 [ 552.401076][T21244] should_failslab+0x5/0x20 [ 552.405555][T21244] kmem_cache_alloc+0x36/0x290 [ 552.410293][T21244] ? memcpy+0x38/0x50 [ 552.414250][T21244] __kernfs_new_node+0xdb/0x6d0 [ 552.419161][T21244] ? kernfs_new_node+0x160/0x160 [ 552.424077][T21244] ? vsnprintf+0x1e4/0x1d60 [ 552.428554][T21244] ? make_kgid+0x24f/0x390 [ 552.433046][T21244] ? from_kuid_munged+0x3b0/0x3b0 [ 552.438057][T21244] kernfs_create_dir_ns+0x90/0x220 [ 552.443140][T21244] sysfs_create_dir_ns+0x181/0x390 [ 552.448228][T21244] ? sysfs_warn_dup+0xa0/0xa0 [ 552.452880][T21244] ? mutex_unlock+0x19/0x40 [ 552.457358][T21244] kobject_add_internal+0x595/0xbd0 [ 552.462528][T21244] kobject_init_and_add+0x123/0x190 [ 552.467698][T21244] ? kobject_add+0x210/0x210 [ 552.472260][T21244] ? kobject_uevent_env+0x2bd/0x1040 [ 552.477517][T21244] ? kernfs_get+0x55/0x90 [ 552.481843][T21244] net_rx_queue_update_kobjects+0x174/0x460 [ 552.487707][T21244] netdev_register_kobject+0x222/0x310 [ 552.493141][T21244] register_netdevice+0xbc7/0x1480 [ 552.498242][T21244] ? netdev_update_lockdep_key+0x10/0x10 [ 552.503863][T21244] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 552.508861][T21244] ? __rcu_read_lock+0x50/0x50 [ 552.513595][T21244] ? alloc_netdev_mqs+0xa0c/0xc60 [ 552.518590][T21244] ? vti6_locate+0x551/0x910 [ 552.523149][T21244] vti6_locate+0x610/0x910 [ 552.527538][T21244] ? cap_capable+0x23f/0x280 [ 552.532098][T21244] ? vti6_link_config+0x530/0x530 [ 552.537092][T21244] ? vti6_ioctl+0xa64/0x1b10 [ 552.541650][T21244] vti6_ioctl+0xa88/0x1b10 [ 552.546036][T21244] ? vti6_tnl_xmit+0x1720/0x1720 [ 552.550945][T21244] ? __rcu_read_lock+0x50/0x50 [ 552.555681][T21244] ? check_preemption_disabled+0x154/0x330 [ 552.561459][T21244] ? avc_has_extended_perms+0xb5e/0x1140 [ 552.567063][T21244] ? full_name_hash+0xb4/0xe0 [ 552.571717][T21244] dev_ifsioc+0x675/0xa70 [ 552.576020][T21244] ? mutex_lock+0xa6/0x110 [ 552.580408][T21244] ? dev_ioctl+0xab0/0xab0 [ 552.584796][T21244] dev_ioctl+0x558/0xab0 [ 552.589011][T21244] sock_ioctl+0x677/0x760 [ 552.593313][T21244] ? sock_poll+0x2f0/0x2f0 [ 552.597723][T21244] ? memset+0x1f/0x40 [ 552.601676][T21244] ? fsnotify+0x1332/0x13f0 [ 552.606149][T21244] ? sock_poll+0x2f0/0x2f0 [ 552.610538][T21244] do_vfs_ioctl+0x76a/0x1720 [ 552.615103][T21244] ? selinux_file_ioctl+0x72f/0x990 [ 552.620275][T21244] ? ioctl_preallocate+0x250/0x250 [ 552.625359][T21244] ? __fget+0x37b/0x3c0 [ 552.629503][T21244] ? vfs_write+0x422/0x4e0 [ 552.633898][T21244] ? fget_many+0x20/0x20 [ 552.638115][T21244] ? debug_smp_processor_id+0x20/0x20 [ 552.643460][T21244] ? security_file_ioctl+0x9d/0xb0 [ 552.648561][T21244] __x64_sys_ioctl+0xd4/0x110 [ 552.653212][T21244] do_syscall_64+0xcb/0x1e0 [ 552.657689][T21244] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 552.663558][T21244] RIP: 0033:0x466459 21:32:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(0xffffffffffffffff) 21:32:37 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xba000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x1000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 552.667444][T21244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 552.687022][T21244] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 552.695403][T21244] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 552.703348][T21244] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 552.711292][T21244] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 552.719235][T21244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 21:32:38 executing program 0 (fault-call:8 fault-nth:85): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:38 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b20}, @mcast2}}) [ 552.727177][T21244] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 552.739859][T21244] kobject_add_internal failed for rx-0 (error: -12 parent: queues) 21:32:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x2000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:38 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xbf010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 552.778889][T21259] xt_SECMARK: invalid mode: 0 [ 552.786105][T21261] xt_SECMARK: invalid mode: 0 [ 552.800830][T21257] FAULT_INJECTION: forcing a failure. [ 552.800830][T21257] name failslab, interval 1, probability 0, space 0, times 0 [ 552.821214][T21257] CPU: 0 PID: 21257 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 552.831568][T21257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.841603][T21257] Call Trace: [ 552.844882][T21257] dump_stack+0x1d8/0x24e [ 552.849236][T21257] ? devkmsg_release+0x11c/0x11c [ 552.854196][T21257] ? show_regs_print_info+0x12/0x12 [ 552.859396][T21257] ? __kasan_kmalloc+0x1a3/0x1e0 [ 552.864337][T21257] ? kmem_cache_alloc+0x115/0x290 [ 552.869352][T21257] ? __kernfs_new_node+0xdb/0x6d0 [ 552.874477][T21257] ? kernfs_create_dir_ns+0x90/0x220 [ 552.879758][T21257] ? sysfs_create_dir_ns+0x181/0x390 [ 552.885100][T21257] should_fail+0x6f6/0x860 [ 552.889509][T21257] ? setup_fault_attr+0x3d0/0x3d0 [ 552.894519][T21257] ? mutex_unlock+0x19/0x40 [ 552.899024][T21257] ? __kernfs_new_node+0xdb/0x6d0 [ 552.904036][T21257] should_failslab+0x5/0x20 [ 552.908535][T21257] kmem_cache_alloc+0x36/0x290 [ 552.913294][T21257] __kernfs_new_node+0xdb/0x6d0 [ 552.918141][T21257] ? kernfs_new_node+0x160/0x160 [ 552.923067][T21257] ? _raw_spin_lock+0xa3/0x1b0 [ 552.927814][T21257] ? security_kernfs_init_security+0x9a/0xb0 [ 552.933777][T21257] kernfs_new_node+0x95/0x160 [ 552.938436][T21257] __kernfs_create_file+0x45/0x260 [ 552.943701][T21257] sysfs_add_file_mode_ns+0x293/0x340 [ 552.949051][T21257] internal_create_group+0x560/0xf10 [ 552.954316][T21257] ? sysfs_create_dir_ns+0x181/0x390 [ 552.959581][T21257] ? sysfs_create_dir_ns+0x1c7/0x390 [ 552.964842][T21257] ? sysfs_create_group+0x20/0x20 [ 552.969848][T21257] sysfs_create_groups+0x5d/0x130 [ 552.974865][T21257] kobject_add_internal+0x708/0xbd0 [ 552.980147][T21257] kobject_init_and_add+0x123/0x190 [ 552.985348][T21257] ? kobject_add+0x210/0x210 [ 552.989925][T21257] ? kobject_uevent_env+0x2bd/0x1040 [ 552.995190][T21257] ? kernfs_get+0x55/0x90 [ 552.999502][T21257] net_rx_queue_update_kobjects+0x174/0x460 [ 553.005384][T21257] netdev_register_kobject+0x222/0x310 [ 553.010825][T21257] register_netdevice+0xbc7/0x1480 [ 553.015917][T21257] ? netdev_update_lockdep_key+0x10/0x10 [ 553.021528][T21257] ? xdp_rxq_info_reg+0x18e/0x2f0 21:32:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x3000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 553.026537][T21257] ? __rcu_read_lock+0x50/0x50 [ 553.031287][T21257] ? alloc_netdev_mqs+0xa0c/0xc60 [ 553.036291][T21257] ? vti6_locate+0x551/0x910 [ 553.040859][T21257] vti6_locate+0x610/0x910 [ 553.045288][T21257] ? cap_capable+0x23f/0x280 [ 553.049862][T21257] ? vti6_link_config+0x530/0x530 [ 553.055010][T21257] ? vti6_ioctl+0xa64/0x1b10 [ 553.059582][T21257] vti6_ioctl+0xa88/0x1b10 [ 553.064113][T21257] ? vti6_tnl_xmit+0x1720/0x1720 [ 553.069043][T21257] ? __rcu_read_lock+0x50/0x50 [ 553.073932][T21257] ? check_preemption_disabled+0x154/0x330 [ 553.079753][T21257] ? avc_has_extended_perms+0xb5e/0x1140 [ 553.085481][T21257] ? full_name_hash+0xb4/0xe0 [ 553.090146][T21257] dev_ifsioc+0x675/0xa70 [ 553.094534][T21257] ? mutex_lock+0xa6/0x110 [ 553.098939][T21257] ? dev_ioctl+0xab0/0xab0 [ 553.103336][T21257] dev_ioctl+0x558/0xab0 [ 553.107622][T21257] sock_ioctl+0x677/0x760 [ 553.112028][T21257] ? sock_poll+0x2f0/0x2f0 [ 553.116434][T21257] ? memset+0x1f/0x40 [ 553.120436][T21257] ? fsnotify+0x1332/0x13f0 [ 553.124916][T21257] ? sock_poll+0x2f0/0x2f0 [ 553.129354][T21257] do_vfs_ioctl+0x76a/0x1720 [ 553.133924][T21257] ? selinux_file_ioctl+0x72f/0x990 [ 553.139102][T21257] ? ioctl_preallocate+0x250/0x250 [ 553.144227][T21257] ? __fget+0x37b/0x3c0 [ 553.148371][T21257] ? vfs_write+0x422/0x4e0 [ 553.152773][T21257] ? fget_many+0x20/0x20 [ 553.157011][T21257] ? debug_smp_processor_id+0x20/0x20 [ 553.162375][T21257] ? security_file_ioctl+0x9d/0xb0 [ 553.167504][T21257] __x64_sys_ioctl+0xd4/0x110 [ 553.172166][T21257] do_syscall_64+0xcb/0x1e0 [ 553.176666][T21257] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 553.182552][T21257] RIP: 0033:0x466459 [ 553.186430][T21257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.206013][T21257] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 553.214413][T21257] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 553.222373][T21257] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:38 executing program 0 (fault-call:8 fault-nth:86): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 553.230325][T21257] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 553.238277][T21257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 553.246344][T21257] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 553.254988][T21257] kobject_add_internal failed for rx-0 (error: -12 parent: queues) [ 553.279617][T21249] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:38 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xc0050000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 553.301208][T21267] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 553.303866][T21278] xt_check_table_hooks: 11 callbacks suppressed [ 553.303871][T21278] x_tables: duplicate underflow at hook 2 [ 553.314423][T21273] FAULT_INJECTION: forcing a failure. [ 553.314423][T21273] name failslab, interval 1, probability 0, space 0, times 0 [ 553.317177][T21279] xt_SECMARK: invalid mode: 0 [ 553.322663][T21273] CPU: 1 PID: 21273 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 553.349360][T21280] xt_SECMARK: invalid mode: 0 [ 553.349815][T21273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.364512][T21273] Call Trace: [ 553.367818][T21273] dump_stack+0x1d8/0x24e [ 553.372132][T21273] ? devkmsg_release+0x11c/0x11c [ 553.377055][T21273] ? show_regs_print_info+0x12/0x12 [ 553.382236][T21273] should_fail+0x6f6/0x860 [ 553.386633][T21273] ? setup_fault_attr+0x3d0/0x3d0 [ 553.391662][T21273] ? kzalloc+0x1d/0x30 [ 553.395776][T21273] should_failslab+0x5/0x20 [ 553.400258][T21273] __kmalloc+0x5f/0x2f0 [ 553.404403][T21273] kzalloc+0x1d/0x30 [ 553.408274][T21273] kobject_get_path+0xb3/0x190 [ 553.413015][T21273] kobject_uevent_env+0x269/0x1040 [ 553.418103][T21273] ? kobject_uevent_env+0x2bd/0x1040 [ 553.423367][T21273] ? kernfs_get+0x55/0x90 [ 553.427679][T21273] net_rx_queue_update_kobjects+0x1ef/0x460 [ 553.433552][T21273] netdev_register_kobject+0x222/0x310 [ 553.439000][T21273] register_netdevice+0xbc7/0x1480 [ 553.444089][T21273] ? netdev_update_lockdep_key+0x10/0x10 [ 553.449698][T21273] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 553.454702][T21273] ? __rcu_read_lock+0x50/0x50 [ 553.459466][T21273] ? alloc_netdev_mqs+0xa0c/0xc60 [ 553.464468][T21273] ? vti6_locate+0x551/0x910 [ 553.469040][T21273] vti6_locate+0x610/0x910 [ 553.473467][T21273] ? cap_capable+0x23f/0x280 [ 553.478033][T21273] ? vti6_link_config+0x530/0x530 [ 553.483037][T21273] ? vti6_ioctl+0xa64/0x1b10 [ 553.487625][T21273] vti6_ioctl+0xa88/0x1b10 [ 553.492018][T21273] ? vti6_tnl_xmit+0x1720/0x1720 [ 553.496940][T21273] ? __rcu_read_lock+0x50/0x50 [ 553.501721][T21273] ? check_preemption_disabled+0x154/0x330 [ 553.507619][T21273] ? avc_has_extended_perms+0xb5e/0x1140 [ 553.513237][T21273] ? full_name_hash+0xb4/0xe0 [ 553.517898][T21273] dev_ifsioc+0x675/0xa70 [ 553.522211][T21273] ? mutex_lock+0xa6/0x110 [ 553.526606][T21273] ? dev_ioctl+0xab0/0xab0 [ 553.531011][T21273] dev_ioctl+0x558/0xab0 [ 553.535232][T21273] sock_ioctl+0x677/0x760 [ 553.539549][T21273] ? sock_poll+0x2f0/0x2f0 [ 553.543944][T21273] ? memset+0x1f/0x40 [ 553.547901][T21273] ? fsnotify+0x1332/0x13f0 [ 553.552381][T21273] ? sock_poll+0x2f0/0x2f0 [ 553.556775][T21273] do_vfs_ioctl+0x76a/0x1720 [ 553.561354][T21273] ? selinux_file_ioctl+0x72f/0x990 [ 553.566539][T21273] ? ioctl_preallocate+0x250/0x250 [ 553.571831][T21273] ? __fget+0x37b/0x3c0 [ 553.575977][T21273] ? vfs_write+0x422/0x4e0 [ 553.580379][T21273] ? fget_many+0x20/0x20 [ 553.584627][T21273] ? debug_smp_processor_id+0x20/0x20 [ 553.589991][T21273] ? security_file_ioctl+0x9d/0xb0 [ 553.595086][T21273] __x64_sys_ioctl+0xd4/0x110 [ 553.599750][T21273] do_syscall_64+0xcb/0x1e0 [ 553.604243][T21273] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 553.610113][T21273] RIP: 0033:0x466459 [ 553.613985][T21273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.633587][T21273] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 553.641975][T21273] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000e00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:38 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b21}, @mcast2}}) [ 553.649927][T21273] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 553.657882][T21273] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 553.665845][T21273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 553.673797][T21273] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(0xffffffffffffffff) 21:32:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:39 executing program 0 (fault-call:8 fault-nth:87): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x5000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:39 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xd2020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 553.811447][T21289] xt_SECMARK: invalid mode: 0 [ 553.813551][T21292] x_tables: duplicate underflow at hook 2 [ 553.817288][T21293] xt_SECMARK: invalid mode: 0 [ 553.840930][T21287] FAULT_INJECTION: forcing a failure. [ 553.840930][T21287] name failslab, interval 1, probability 0, space 0, times 0 [ 553.845959][T21297] x_tables: duplicate underflow at hook 2 [ 553.854022][T21287] CPU: 1 PID: 21287 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 553.869626][T21287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.879920][T21287] Call Trace: [ 553.883202][T21287] dump_stack+0x1d8/0x24e [ 553.887689][T21287] ? devkmsg_release+0x11c/0x11c [ 553.892615][T21287] ? show_regs_print_info+0x12/0x12 [ 553.897804][T21287] ? vsnprintf+0x1cb4/0x1d60 [ 553.902389][T21287] should_fail+0x6f6/0x860 [ 553.906784][T21287] ? setup_fault_attr+0x3d0/0x3d0 [ 553.911793][T21287] ? __alloc_skb+0x75/0x4d0 [ 553.916289][T21287] should_failslab+0x5/0x20 [ 553.920778][T21287] kmem_cache_alloc+0x36/0x290 [ 553.925529][T21287] __alloc_skb+0x75/0x4d0 [ 553.929852][T21287] ? mutex_lock+0xa6/0x110 [ 553.934245][T21287] alloc_uevent_skb+0x73/0x220 [ 553.938995][T21287] kobject_uevent_env+0x972/0x1040 [ 553.944090][T21287] ? kernfs_get+0x55/0x90 [ 553.948410][T21287] net_rx_queue_update_kobjects+0x1ef/0x460 [ 553.954305][T21287] netdev_register_kobject+0x222/0x310 [ 553.959769][T21287] register_netdevice+0xbc7/0x1480 [ 553.964873][T21287] ? netdev_update_lockdep_key+0x10/0x10 [ 553.970518][T21287] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 553.975529][T21287] ? __rcu_read_lock+0x50/0x50 [ 553.980278][T21287] ? alloc_netdev_mqs+0xa0c/0xc60 [ 553.985301][T21287] ? vti6_locate+0x551/0x910 [ 553.989878][T21287] vti6_locate+0x610/0x910 [ 553.994299][T21287] ? cap_capable+0x23f/0x280 [ 553.998915][T21287] ? vti6_link_config+0x530/0x530 [ 554.003921][T21287] ? vti6_ioctl+0xa64/0x1b10 [ 554.008526][T21287] vti6_ioctl+0xa88/0x1b10 [ 554.012931][T21287] ? vti6_tnl_xmit+0x1720/0x1720 [ 554.017866][T21287] ? __rcu_read_lock+0x50/0x50 [ 554.022620][T21287] ? check_preemption_disabled+0x154/0x330 [ 554.028415][T21287] ? avc_has_extended_perms+0xb5e/0x1140 [ 554.034069][T21287] ? full_name_hash+0xb4/0xe0 [ 554.038741][T21287] dev_ifsioc+0x675/0xa70 [ 554.043063][T21287] ? mutex_lock+0xa6/0x110 [ 554.047462][T21287] ? dev_ioctl+0xab0/0xab0 [ 554.051861][T21287] dev_ioctl+0x558/0xab0 [ 554.056109][T21287] sock_ioctl+0x677/0x760 [ 554.060417][T21287] ? sock_poll+0x2f0/0x2f0 [ 554.064832][T21287] ? memset+0x1f/0x40 [ 554.068825][T21287] ? fsnotify+0x1332/0x13f0 [ 554.073307][T21287] ? sock_poll+0x2f0/0x2f0 [ 554.077708][T21287] do_vfs_ioctl+0x76a/0x1720 [ 554.082285][T21287] ? selinux_file_ioctl+0x72f/0x990 [ 554.087470][T21287] ? ioctl_preallocate+0x250/0x250 [ 554.092615][T21287] ? __fget+0x37b/0x3c0 [ 554.096773][T21287] ? vfs_write+0x422/0x4e0 [ 554.101185][T21287] ? fget_many+0x20/0x20 [ 554.105426][T21287] ? debug_smp_processor_id+0x20/0x20 [ 554.110788][T21287] ? security_file_ioctl+0x9d/0xb0 [ 554.115887][T21287] __x64_sys_ioctl+0xd4/0x110 [ 554.120555][T21287] do_syscall_64+0xcb/0x1e0 [ 554.125047][T21287] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 554.130922][T21287] RIP: 0033:0x466459 [ 554.134803][T21287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 554.154411][T21287] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:32:39 executing program 0 (fault-call:8 fault-nth:88): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 554.162811][T21287] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 554.170761][T21287] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 554.178713][T21287] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 554.186664][T21287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 554.194619][T21287] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:39 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xd6020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:39 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b22}, @mcast2}}) [ 554.213003][T21288] EXT4-fs (loop1): Can't read superblock on 2nd try [ 554.234943][T21291] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 554.246714][T21305] x_tables: duplicate underflow at hook 2 [ 554.288349][T21313] x_tables: duplicate underflow at hook 2 [ 554.294179][T21288] EXT4-fs (loop1): Can't read superblock on 2nd try [ 554.305480][T21307] FAULT_INJECTION: forcing a failure. [ 554.305480][T21307] name failslab, interval 1, probability 0, space 0, times 0 [ 554.318772][T21307] CPU: 0 PID: 21307 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 554.329020][T21307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.339064][T21307] Call Trace: [ 554.342339][T21307] dump_stack+0x1d8/0x24e [ 554.346656][T21307] ? devkmsg_release+0x11c/0x11c [ 554.351607][T21307] ? show_regs_print_info+0x12/0x12 [ 554.356789][T21307] should_fail+0x6f6/0x860 [ 554.361180][T21307] ? setup_fault_attr+0x3d0/0x3d0 [ 554.366185][T21307] ? alloc_uevent_skb+0x73/0x220 [ 554.371100][T21307] should_failslab+0x5/0x20 [ 554.375580][T21307] __kmalloc_track_caller+0x5d/0x2e0 [ 554.380844][T21307] ? kmem_cache_alloc+0x115/0x290 [ 554.385851][T21307] ? alloc_uevent_skb+0x73/0x220 [ 554.390924][T21307] __alloc_skb+0xaf/0x4d0 [ 554.395253][T21307] ? mutex_lock+0xa6/0x110 [ 554.399660][T21307] alloc_uevent_skb+0x73/0x220 [ 554.404424][T21307] kobject_uevent_env+0x972/0x1040 [ 554.409523][T21307] ? kernfs_get+0x55/0x90 [ 554.413834][T21307] net_rx_queue_update_kobjects+0x1ef/0x460 [ 554.419707][T21307] netdev_register_kobject+0x222/0x310 [ 554.425153][T21307] register_netdevice+0xbc7/0x1480 [ 554.430325][T21307] ? netdev_update_lockdep_key+0x10/0x10 [ 554.436010][T21307] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 554.441276][T21307] ? __rcu_read_lock+0x50/0x50 [ 554.446078][T21307] ? alloc_netdev_mqs+0xa0c/0xc60 [ 554.451084][T21307] ? vti6_locate+0x551/0x910 [ 554.455654][T21307] vti6_locate+0x610/0x910 [ 554.460062][T21307] ? cap_capable+0x23f/0x280 [ 554.464692][T21307] ? vti6_link_config+0x530/0x530 [ 554.469705][T21307] ? vti6_ioctl+0xa64/0x1b10 [ 554.474280][T21307] vti6_ioctl+0xa88/0x1b10 [ 554.478684][T21307] ? vti6_tnl_xmit+0x1720/0x1720 [ 554.483604][T21307] ? __rcu_read_lock+0x50/0x50 [ 554.488347][T21307] ? check_preemption_disabled+0x154/0x330 [ 554.494135][T21307] ? avc_has_extended_perms+0xb5e/0x1140 [ 554.499826][T21307] ? full_name_hash+0xb4/0xe0 [ 554.504532][T21307] dev_ifsioc+0x675/0xa70 [ 554.508866][T21307] ? mutex_lock+0xa6/0x110 [ 554.513409][T21307] ? dev_ioctl+0xab0/0xab0 [ 554.517805][T21307] dev_ioctl+0x558/0xab0 [ 554.522035][T21307] sock_ioctl+0x677/0x760 [ 554.526354][T21307] ? sock_poll+0x2f0/0x2f0 [ 554.530751][T21307] ? memset+0x1f/0x40 [ 554.534710][T21307] ? fsnotify+0x1332/0x13f0 [ 554.539188][T21307] ? sock_poll+0x2f0/0x2f0 [ 554.543591][T21307] do_vfs_ioctl+0x76a/0x1720 [ 554.548169][T21307] ? selinux_file_ioctl+0x72f/0x990 [ 554.553467][T21307] ? ioctl_preallocate+0x250/0x250 [ 554.558559][T21307] ? __fget+0x37b/0x3c0 [ 554.562699][T21307] ? vfs_write+0x422/0x4e0 [ 554.567098][T21307] ? fget_many+0x20/0x20 [ 554.571322][T21307] ? debug_smp_processor_id+0x20/0x20 [ 554.576675][T21307] ? security_file_ioctl+0x9d/0xb0 [ 554.581777][T21307] __x64_sys_ioctl+0xd4/0x110 [ 554.586442][T21307] do_syscall_64+0xcb/0x1e0 [ 554.590931][T21307] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 554.596809][T21307] RIP: 0033:0x466459 [ 554.600679][T21307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 554.620265][T21307] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 554.628663][T21307] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:39 executing program 0 (fault-call:8 fault-nth:89): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:39 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xdb000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x1000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x8000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:39 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xe4010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 554.636621][T21307] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 554.645526][T21307] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 554.653478][T21307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 554.661432][T21307] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:40 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xe8030000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:40 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b23}, @mcast2}}) 21:32:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000e00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x9000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 554.712494][T21322] x_tables: duplicate underflow at hook 2 [ 554.714044][T21324] x_tables: duplicate underflow at hook 2 [ 554.729034][T21327] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xa000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 554.774731][T21335] FAULT_INJECTION: forcing a failure. [ 554.774731][T21335] name failslab, interval 1, probability 0, space 0, times 0 [ 554.792155][T21339] EXT4-fs (loop2): Can't read superblock on 2nd try [ 554.798889][T21335] CPU: 1 PID: 21335 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 554.809119][T21335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.812556][T21344] x_tables: duplicate underflow at hook 2 [ 554.819264][T21335] Call Trace: [ 554.819286][T21335] dump_stack+0x1d8/0x24e [ 554.819297][T21335] ? devkmsg_release+0x11c/0x11c [ 554.819306][T21335] ? show_regs_print_info+0x12/0x12 [ 554.819318][T21335] should_fail+0x6f6/0x860 [ 554.819327][T21335] ? setup_fault_attr+0x3d0/0x3d0 [ 554.819337][T21335] ? kzalloc+0x1d/0x30 [ 554.819353][T21335] should_failslab+0x5/0x20 [ 554.860811][T21335] __kmalloc+0x5f/0x2f0 [ 554.864964][T21335] kzalloc+0x1d/0x30 [ 554.868875][T21335] kobject_get_path+0xb3/0x190 [ 554.873618][T21335] kobject_uevent_env+0x269/0x1040 [ 554.878740][T21335] ? kobject_uevent_env+0x2bd/0x1040 [ 554.884015][T21335] ? kernfs_get+0x55/0x90 [ 554.888328][T21335] net_rx_queue_update_kobjects+0x1ef/0x460 [ 554.894329][T21335] netdev_register_kobject+0x222/0x310 [ 554.899775][T21335] register_netdevice+0xbc7/0x1480 [ 554.904874][T21335] ? netdev_update_lockdep_key+0x10/0x10 [ 554.910486][T21335] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 554.915512][T21335] ? __rcu_read_lock+0x50/0x50 [ 554.920332][T21335] ? alloc_netdev_mqs+0xa0c/0xc60 [ 554.925342][T21335] ? vti6_locate+0x551/0x910 [ 554.929963][T21335] vti6_locate+0x610/0x910 [ 554.934373][T21335] ? cap_capable+0x23f/0x280 [ 554.939493][T21335] ? vti6_link_config+0x530/0x530 [ 554.944500][T21335] ? vti6_ioctl+0xa64/0x1b10 [ 554.949071][T21335] vti6_ioctl+0xa88/0x1b10 [ 554.953474][T21335] ? vti6_tnl_xmit+0x1720/0x1720 [ 554.958399][T21335] ? __rcu_read_lock+0x50/0x50 [ 554.963164][T21335] ? check_preemption_disabled+0x154/0x330 [ 554.968953][T21335] ? avc_has_extended_perms+0xb5e/0x1140 [ 554.974706][T21335] ? full_name_hash+0xb4/0xe0 [ 554.979460][T21335] dev_ifsioc+0x675/0xa70 [ 554.983774][T21335] ? mutex_lock+0xa6/0x110 [ 554.988177][T21335] ? dev_ioctl+0xab0/0xab0 [ 554.992659][T21335] dev_ioctl+0x558/0xab0 [ 554.996960][T21335] sock_ioctl+0x677/0x760 [ 555.001283][T21335] ? sock_poll+0x2f0/0x2f0 [ 555.005796][T21335] ? memset+0x1f/0x40 [ 555.009760][T21335] ? fsnotify+0x1332/0x13f0 [ 555.014252][T21335] ? sock_poll+0x2f0/0x2f0 [ 555.018664][T21335] do_vfs_ioctl+0x76a/0x1720 [ 555.023242][T21335] ? selinux_file_ioctl+0x72f/0x990 [ 555.028436][T21335] ? ioctl_preallocate+0x250/0x250 [ 555.033533][T21335] ? __fget+0x37b/0x3c0 [ 555.037681][T21335] ? vfs_write+0x422/0x4e0 [ 555.042087][T21335] ? fget_many+0x20/0x20 [ 555.046315][T21335] ? debug_smp_processor_id+0x20/0x20 [ 555.051676][T21335] ? security_file_ioctl+0x9d/0xb0 [ 555.056786][T21335] __x64_sys_ioctl+0xd4/0x110 [ 555.061478][T21335] do_syscall_64+0xcb/0x1e0 [ 555.065979][T21335] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 555.071858][T21335] RIP: 0033:0x466459 21:32:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001100900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 555.075730][T21335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 555.095389][T21335] RSP: 002b:00007faa9aa7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 555.103784][T21335] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 555.112011][T21335] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:40 executing program 0 (fault-call:8 fault-nth:90): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:40 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xea030000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:40 executing program 2: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0xea03000000000000}, @mcast2}}) [ 555.119968][T21335] RBP: 00007faa9aa7f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 555.127923][T21335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 555.135914][T21335] R13: 00007ffe4ada44ff R14: 00007faa9aa7f300 R15: 0000000000022000 21:32:40 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf6020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xb000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 555.185183][T21353] x_tables: duplicate underflow at hook 2 [ 555.220866][T21347] FAULT_INJECTION: forcing a failure. [ 555.220866][T21347] name failslab, interval 1, probability 0, space 0, times 0 [ 555.234452][T21356] EXT4-fs (loop1): Can't read superblock on 2nd try [ 555.246804][T21347] CPU: 0 PID: 21347 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 555.250185][T21364] x_tables: duplicate underflow at hook 2 [ 555.257150][T21347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.257154][T21347] Call Trace: [ 555.257176][T21347] dump_stack+0x1d8/0x24e [ 555.257196][T21347] ? devkmsg_release+0x11c/0x11c [ 555.285567][T21347] ? show_regs_print_info+0x12/0x12 [ 555.290760][T21347] ? vti6_locate+0x610/0x910 [ 555.295400][T21347] ? dev_ifsioc+0x675/0xa70 [ 555.299895][T21347] ? dev_ioctl+0x558/0xab0 [ 555.304402][T21347] ? sock_ioctl+0x677/0x760 [ 555.308898][T21347] should_fail+0x6f6/0x860 [ 555.313298][T21347] ? setup_fault_attr+0x3d0/0x3d0 [ 555.318328][T21347] ? kobject_set_name_vargs+0x5d/0x110 [ 555.323768][T21347] should_failslab+0x5/0x20 [ 555.328347][T21347] __kmalloc_track_caller+0x5d/0x2e0 [ 555.333624][T21347] kvasprintf+0xd6/0x180 [ 555.337845][T21347] ? asan.module_ctor+0x10/0x10 [ 555.342703][T21347] ? slab_free_freelist_hook+0x7b/0x150 [ 555.348235][T21347] ? kvasprintf_const+0x4d/0x170 [ 555.353183][T21347] kobject_set_name_vargs+0x5d/0x110 [ 555.358450][T21347] kobject_init_and_add+0xdb/0x190 [ 555.363561][T21347] ? kobject_add+0x210/0x210 [ 555.368165][T21347] ? kernfs_get+0x55/0x90 [ 555.372498][T21347] netdev_queue_update_kobjects+0x16e/0x3c0 [ 555.378386][T21347] netdev_register_kobject+0x263/0x310 [ 555.383829][T21347] register_netdevice+0xbc7/0x1480 [ 555.388933][T21347] ? netdev_update_lockdep_key+0x10/0x10 [ 555.394605][T21347] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 555.399619][T21347] ? __rcu_read_lock+0x50/0x50 [ 555.404367][T21347] ? alloc_netdev_mqs+0xa0c/0xc60 [ 555.409373][T21347] ? vti6_locate+0x551/0x910 [ 555.413971][T21347] vti6_locate+0x610/0x910 [ 555.418481][T21347] ? cap_capable+0x23f/0x280 [ 555.423059][T21347] ? vti6_link_config+0x530/0x530 [ 555.428074][T21347] ? vti6_ioctl+0xa64/0x1b10 [ 555.432643][T21347] vti6_ioctl+0xa88/0x1b10 [ 555.437046][T21347] ? vti6_tnl_xmit+0x1720/0x1720 [ 555.441974][T21347] ? __rcu_read_lock+0x50/0x50 [ 555.446724][T21347] ? check_preemption_disabled+0x154/0x330 [ 555.452522][T21347] ? avc_has_extended_perms+0xb5e/0x1140 [ 555.458145][T21347] ? full_name_hash+0xb4/0xe0 [ 555.462812][T21347] dev_ifsioc+0x675/0xa70 [ 555.467124][T21347] ? mutex_lock+0xa6/0x110 [ 555.471528][T21347] ? dev_ioctl+0xab0/0xab0 [ 555.475929][T21347] dev_ioctl+0x558/0xab0 [ 555.480154][T21347] sock_ioctl+0x677/0x760 [ 555.484465][T21347] ? sock_poll+0x2f0/0x2f0 [ 555.488858][T21347] ? memset+0x1f/0x40 [ 555.492850][T21347] ? fsnotify+0x1332/0x13f0 [ 555.497350][T21347] ? sock_poll+0x2f0/0x2f0 [ 555.501753][T21347] do_vfs_ioctl+0x76a/0x1720 [ 555.506323][T21347] ? selinux_file_ioctl+0x72f/0x990 [ 555.511507][T21347] ? ioctl_preallocate+0x250/0x250 [ 555.516597][T21347] ? __fget+0x37b/0x3c0 [ 555.520732][T21347] ? vfs_write+0x422/0x4e0 [ 555.525146][T21347] ? fget_many+0x20/0x20 [ 555.529398][T21347] ? debug_smp_processor_id+0x20/0x20 [ 555.534772][T21347] ? security_file_ioctl+0x9d/0xb0 [ 555.539891][T21347] __x64_sys_ioctl+0xd4/0x110 [ 555.544558][T21347] do_syscall_64+0xcb/0x1e0 [ 555.549042][T21347] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 555.554911][T21347] RIP: 0033:0x466459 [ 555.558782][T21347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 555.578370][T21347] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:32:40 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf8010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xc000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:40 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b24}, @mcast2}}) 21:32:40 executing program 0 (fault-call:8 fault-nth:91): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 555.586765][T21347] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 555.594830][T21347] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 555.602801][T21347] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 555.610760][T21347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 555.618716][T21347] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 555.628256][T21347] kobject: can not set name properly! [ 555.657039][T21367] FAULT_INJECTION: forcing a failure. [ 555.657039][T21367] name failslab, interval 1, probability 0, space 0, times 0 [ 555.670737][T21367] CPU: 1 PID: 21367 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 555.680984][T21367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.691043][T21367] Call Trace: [ 555.694428][T21367] dump_stack+0x1d8/0x24e [ 555.698757][T21367] ? devkmsg_release+0x11c/0x11c 21:32:40 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf8030000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:40 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfb060000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:41 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfc060000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 555.703698][T21367] ? show_regs_print_info+0x12/0x12 [ 555.708899][T21367] ? vti6_locate+0x610/0x910 [ 555.713501][T21367] ? dev_ifsioc+0x675/0xa70 [ 555.718002][T21367] ? dev_ioctl+0x558/0xab0 [ 555.722409][T21367] ? sock_ioctl+0x677/0x760 [ 555.727009][T21367] should_fail+0x6f6/0x860 [ 555.731425][T21367] ? setup_fault_attr+0x3d0/0x3d0 [ 555.736438][T21367] ? kobject_set_name_vargs+0x5d/0x110 [ 555.741887][T21367] should_failslab+0x5/0x20 [ 555.746390][T21367] __kmalloc_track_caller+0x5d/0x2e0 [ 555.751677][T21367] kvasprintf+0xd6/0x180 [ 555.755922][T21367] ? asan.module_ctor+0x10/0x10 [ 555.760765][T21367] ? slab_free_freelist_hook+0x7b/0x150 [ 555.766368][T21367] ? kvasprintf_const+0x4d/0x170 [ 555.771294][T21367] kobject_set_name_vargs+0x5d/0x110 [ 555.776566][T21367] kobject_init_and_add+0xdb/0x190 [ 555.781675][T21367] ? kobject_add+0x210/0x210 [ 555.786264][T21367] ? kernfs_get+0x55/0x90 [ 555.790598][T21367] netdev_queue_update_kobjects+0x16e/0x3c0 [ 555.796521][T21367] netdev_register_kobject+0x263/0x310 [ 555.802009][T21367] register_netdevice+0xbc7/0x1480 [ 555.807121][T21367] ? netdev_update_lockdep_key+0x10/0x10 [ 555.812743][T21367] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 555.817748][T21367] ? __rcu_read_lock+0x50/0x50 [ 555.822492][T21367] ? alloc_netdev_mqs+0xa0c/0xc60 [ 555.827495][T21367] ? vti6_locate+0x551/0x910 [ 555.832077][T21367] vti6_locate+0x610/0x910 [ 555.836482][T21367] ? cap_capable+0x23f/0x280 [ 555.841066][T21367] ? vti6_link_config+0x530/0x530 [ 555.846081][T21367] ? vti6_ioctl+0xa64/0x1b10 [ 555.850670][T21367] vti6_ioctl+0xa88/0x1b10 [ 555.855082][T21367] ? vti6_tnl_xmit+0x1720/0x1720 [ 555.860015][T21367] ? __rcu_read_lock+0x50/0x50 [ 555.864777][T21367] ? check_preemption_disabled+0x154/0x330 [ 555.870568][T21367] ? avc_has_extended_perms+0xb5e/0x1140 [ 555.876201][T21367] ? full_name_hash+0xb4/0xe0 [ 555.880871][T21367] dev_ifsioc+0x675/0xa70 [ 555.885208][T21367] ? mutex_lock+0xa6/0x110 [ 555.889630][T21367] ? dev_ioctl+0xab0/0xab0 [ 555.894052][T21367] dev_ioctl+0x558/0xab0 [ 555.898312][T21367] sock_ioctl+0x677/0x760 [ 555.902770][T21367] ? sock_poll+0x2f0/0x2f0 [ 555.907184][T21367] ? memset+0x1f/0x40 [ 555.911182][T21367] ? fsnotify+0x1332/0x13f0 [ 555.915669][T21367] ? sock_poll+0x2f0/0x2f0 [ 555.920217][T21367] do_vfs_ioctl+0x76a/0x1720 [ 555.924804][T21367] ? selinux_file_ioctl+0x72f/0x990 [ 555.929985][T21367] ? ioctl_preallocate+0x250/0x250 [ 555.935085][T21367] ? __fget+0x37b/0x3c0 [ 555.939235][T21367] ? vfs_write+0x422/0x4e0 [ 555.943643][T21367] ? fget_many+0x20/0x20 [ 555.947867][T21367] ? debug_smp_processor_id+0x20/0x20 [ 555.953221][T21367] ? security_file_ioctl+0x9d/0xb0 [ 555.958315][T21367] __x64_sys_ioctl+0xd4/0x110 [ 555.962979][T21367] do_syscall_64+0xcb/0x1e0 [ 555.967463][T21367] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 555.973334][T21367] RIP: 0033:0x466459 [ 555.977204][T21367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 555.996789][T21367] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:32:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001200900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:41 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfe030000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xd000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:41 executing program 0 (fault-call:8 fault-nth:92): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:41 executing program 2 (fault-call:2 fault-nth:0): r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) [ 556.005192][T21367] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 556.013145][T21367] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 556.021103][T21367] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 556.029066][T21367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 556.037028][T21367] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 556.047837][T21367] kobject: can not set name properly! 21:32:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xe000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:41 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 556.077276][T21356] EXT4-fs (loop1): Can't read superblock on 2nd try [ 556.127108][T21394] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 556.138048][T21399] FAULT_INJECTION: forcing a failure. [ 556.138048][T21399] name failslab, interval 1, probability 0, space 0, times 0 [ 556.157549][T21394] EXT4-fs (loop2): re-mounted. Opts: (null) [ 556.160255][T21399] CPU: 1 PID: 21399 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 556.173701][T21399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.183749][T21399] Call Trace: [ 556.187173][T21399] dump_stack+0x1d8/0x24e [ 556.191491][T21399] ? devkmsg_release+0x11c/0x11c [ 556.196408][T21399] ? show_regs_print_info+0x12/0x12 [ 556.201584][T21399] should_fail+0x6f6/0x860 [ 556.205975][T21399] ? setup_fault_attr+0x3d0/0x3d0 [ 556.210974][T21399] ? __kernfs_new_node+0xdb/0x6d0 [ 556.215973][T21399] should_failslab+0x5/0x20 [ 556.220454][T21399] kmem_cache_alloc+0x36/0x290 [ 556.225191][T21399] ? memcpy+0x38/0x50 [ 556.229150][T21399] __kernfs_new_node+0xdb/0x6d0 [ 556.233978][T21399] ? kernfs_new_node+0x160/0x160 [ 556.238887][T21399] ? vsnprintf+0x1e4/0x1d60 [ 556.243364][T21399] ? make_kgid+0x24f/0x390 [ 556.247756][T21399] ? from_kuid_munged+0x3b0/0x3b0 [ 556.252762][T21399] kernfs_create_dir_ns+0x90/0x220 [ 556.257848][T21399] sysfs_create_dir_ns+0x181/0x390 [ 556.262934][T21399] ? sysfs_warn_dup+0xa0/0xa0 [ 556.267587][T21399] kobject_add_internal+0x595/0xbd0 [ 556.272759][T21399] kobject_init_and_add+0x123/0x190 [ 556.277943][T21399] ? kobject_add+0x210/0x210 [ 556.282508][T21399] ? kernfs_get+0x55/0x90 [ 556.286814][T21399] netdev_queue_update_kobjects+0x16e/0x3c0 [ 556.292702][T21399] netdev_register_kobject+0x263/0x310 [ 556.298134][T21399] register_netdevice+0xbc7/0x1480 [ 556.303239][T21399] ? netdev_update_lockdep_key+0x10/0x10 [ 556.308844][T21399] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 556.313850][T21399] ? __rcu_read_lock+0x50/0x50 [ 556.318584][T21399] ? alloc_netdev_mqs+0xa0c/0xc60 [ 556.323581][T21399] ? vti6_locate+0x551/0x910 [ 556.328141][T21399] vti6_locate+0x610/0x910 [ 556.332553][T21399] ? cap_capable+0x23f/0x280 [ 556.337127][T21399] ? vti6_link_config+0x530/0x530 [ 556.342131][T21399] ? vti6_ioctl+0xa64/0x1b10 [ 556.346696][T21399] vti6_ioctl+0xa88/0x1b10 [ 556.351090][T21399] ? vti6_tnl_xmit+0x1720/0x1720 [ 556.356004][T21399] ? __rcu_read_lock+0x50/0x50 [ 556.360744][T21399] ? check_preemption_disabled+0x154/0x330 [ 556.366524][T21399] ? avc_has_extended_perms+0xb5e/0x1140 [ 556.372131][T21399] ? full_name_hash+0xb4/0xe0 [ 556.376783][T21399] dev_ifsioc+0x675/0xa70 [ 556.381087][T21399] ? mutex_lock+0xa6/0x110 [ 556.385476][T21399] ? dev_ioctl+0xab0/0xab0 [ 556.389868][T21399] dev_ioctl+0x558/0xab0 [ 556.394085][T21399] sock_ioctl+0x677/0x760 [ 556.398404][T21399] ? sock_poll+0x2f0/0x2f0 [ 556.402810][T21399] ? memset+0x1f/0x40 [ 556.406782][T21399] ? fsnotify+0x1332/0x13f0 [ 556.411269][T21399] ? sock_poll+0x2f0/0x2f0 [ 556.415658][T21399] do_vfs_ioctl+0x76a/0x1720 [ 556.420229][T21399] ? selinux_file_ioctl+0x72f/0x990 [ 556.425400][T21399] ? ioctl_preallocate+0x250/0x250 [ 556.430483][T21399] ? __fget+0x37b/0x3c0 [ 556.434627][T21399] ? vfs_write+0x422/0x4e0 [ 556.439015][T21399] ? fget_many+0x20/0x20 [ 556.443233][T21399] ? debug_smp_processor_id+0x20/0x20 [ 556.448579][T21399] ? security_file_ioctl+0x9d/0xb0 [ 556.453688][T21399] __x64_sys_ioctl+0xd4/0x110 [ 556.458347][T21399] do_syscall_64+0xcb/0x1e0 [ 556.462837][T21399] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 556.468704][T21399] RIP: 0033:0x466459 [ 556.472574][T21399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 556.492152][T21399] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 556.500535][T21399] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 556.508479][T21399] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 556.516422][T21399] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 21:32:41 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b25}, @mcast2}}) 21:32:41 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x10000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:41 executing program 0 (fault-call:8 fault-nth:93): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:41 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 556.524365][T21399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 556.532314][T21399] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 556.561747][T21397] EXT4-fs (loop1): Can't read superblock on 2nd try [ 556.569081][T21399] kobject_add_internal failed for tx-0 (error: -12 parent: queues) [ 556.599395][T21412] FAULT_INJECTION: forcing a failure. [ 556.599395][T21412] name failslab, interval 1, probability 0, space 0, times 0 [ 556.612120][T21412] CPU: 1 PID: 21412 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 556.622358][T21412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.632398][T21412] Call Trace: [ 556.635677][T21412] dump_stack+0x1d8/0x24e [ 556.640008][T21412] ? devkmsg_release+0x11c/0x11c [ 556.644950][T21412] ? show_regs_print_info+0x12/0x12 [ 556.650133][T21412] ? __kasan_kmalloc+0x1a3/0x1e0 [ 556.655044][T21412] ? kmem_cache_alloc+0x115/0x290 [ 556.660044][T21412] ? __kernfs_new_node+0xdb/0x6d0 [ 556.665042][T21412] ? kernfs_create_dir_ns+0x90/0x220 [ 556.670296][T21412] ? sysfs_create_dir_ns+0x181/0x390 [ 556.675555][T21412] should_fail+0x6f6/0x860 [ 556.679944][T21412] ? setup_fault_attr+0x3d0/0x3d0 [ 556.684942][T21412] ? mutex_unlock+0x19/0x40 [ 556.689417][T21412] ? __kernfs_new_node+0xdb/0x6d0 [ 556.694414][T21412] should_failslab+0x5/0x20 [ 556.698918][T21412] kmem_cache_alloc+0x36/0x290 [ 556.703674][T21412] __kernfs_new_node+0xdb/0x6d0 [ 556.708499][T21412] ? kernfs_new_node+0x160/0x160 [ 556.713412][T21412] ? _raw_spin_lock+0xa3/0x1b0 [ 556.718155][T21412] ? security_kernfs_init_security+0x9a/0xb0 [ 556.724131][T21412] kernfs_new_node+0x95/0x160 [ 556.728870][T21412] __kernfs_create_file+0x45/0x260 [ 556.733982][T21412] sysfs_add_file_mode_ns+0x293/0x340 [ 556.739343][T21412] internal_create_group+0x560/0xf10 [ 556.744616][T21412] ? sysfs_create_dir_ns+0x181/0x390 [ 556.749877][T21412] ? sysfs_create_dir_ns+0x1c7/0x390 [ 556.755133][T21412] ? sysfs_create_group+0x20/0x20 [ 556.760131][T21412] sysfs_create_groups+0x5d/0x130 [ 556.765132][T21412] kobject_add_internal+0x708/0xbd0 [ 556.770315][T21412] kobject_init_and_add+0x123/0x190 [ 556.775502][T21412] ? kobject_add+0x210/0x210 [ 556.780065][T21412] ? kernfs_get+0x55/0x90 [ 556.784369][T21412] netdev_queue_update_kobjects+0x16e/0x3c0 [ 556.790237][T21412] netdev_register_kobject+0x263/0x310 [ 556.795670][T21412] register_netdevice+0xbc7/0x1480 [ 556.800757][T21412] ? netdev_update_lockdep_key+0x10/0x10 [ 556.806359][T21412] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 556.811356][T21412] ? __rcu_read_lock+0x50/0x50 [ 556.816091][T21412] ? alloc_netdev_mqs+0xa0c/0xc60 [ 556.821089][T21412] ? vti6_locate+0x551/0x910 [ 556.825652][T21412] vti6_locate+0x610/0x910 [ 556.830043][T21412] ? cap_capable+0x23f/0x280 [ 556.834606][T21412] ? vti6_link_config+0x530/0x530 [ 556.839602][T21412] ? vti6_ioctl+0xa64/0x1b10 [ 556.844182][T21412] vti6_ioctl+0xa88/0x1b10 [ 556.848601][T21412] ? vti6_tnl_xmit+0x1720/0x1720 [ 556.853522][T21412] ? __rcu_read_lock+0x50/0x50 [ 556.858286][T21412] ? check_preemption_disabled+0x154/0x330 [ 556.864074][T21412] ? avc_has_extended_perms+0xb5e/0x1140 [ 556.869684][T21412] ? full_name_hash+0xb4/0xe0 [ 556.874361][T21412] dev_ifsioc+0x675/0xa70 [ 556.878674][T21412] ? mutex_lock+0xa6/0x110 [ 556.883063][T21412] ? dev_ioctl+0xab0/0xab0 [ 556.887468][T21412] dev_ioctl+0x558/0xab0 [ 556.891686][T21412] sock_ioctl+0x677/0x760 [ 556.896004][T21412] ? sock_poll+0x2f0/0x2f0 [ 556.900394][T21412] ? memset+0x1f/0x40 [ 556.904348][T21412] ? fsnotify+0x1332/0x13f0 [ 556.908822][T21412] ? sock_poll+0x2f0/0x2f0 [ 556.913231][T21412] do_vfs_ioctl+0x76a/0x1720 [ 556.917796][T21412] ? selinux_file_ioctl+0x72f/0x990 [ 556.922969][T21412] ? ioctl_preallocate+0x250/0x250 [ 556.928058][T21412] ? __fget+0x37b/0x3c0 [ 556.932186][T21412] ? vfs_write+0x422/0x4e0 [ 556.936574][T21412] ? fget_many+0x20/0x20 [ 556.940790][T21412] ? debug_smp_processor_id+0x20/0x20 [ 556.946137][T21412] ? security_file_ioctl+0x9d/0xb0 [ 556.951222][T21412] __x64_sys_ioctl+0xd4/0x110 [ 556.955873][T21412] do_syscall_64+0xcb/0x1e0 [ 556.960353][T21412] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 556.966218][T21412] RIP: 0033:0x466459 [ 556.970088][T21412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 556.989668][T21412] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 556.998051][T21412] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 557.006034][T21412] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 557.013980][T21412] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 557.021925][T21412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 557.029881][T21412] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 557.048263][T21412] kobject_add_internal failed for tx-0 (error: -12 parent: queues) 21:32:42 executing program 0 (fault-call:8 fault-nth:94): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019002200900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:42 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x11000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:42 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b26}, @mcast2}}) [ 557.110279][T21413] EXT4-fs (loop1): Can't read superblock on 2nd try [ 557.186453][T21426] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 557.211169][T21432] FAULT_INJECTION: forcing a failure. [ 557.211169][T21432] name failslab, interval 1, probability 0, space 0, times 0 [ 557.224925][T21437] EXT4-fs (loop2): re-mounted. Opts: (null) [ 557.225349][T21432] CPU: 0 PID: 21432 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 557.241064][T21432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.251107][T21432] Call Trace: [ 557.254386][T21432] dump_stack+0x1d8/0x24e [ 557.258708][T21432] ? devkmsg_release+0x11c/0x11c [ 557.269144][T21432] ? mutex_unlock+0x19/0x40 [ 557.276462][T21432] ? show_regs_print_info+0x12/0x12 [ 557.281945][T21432] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 557.289788][T21432] should_fail+0x6f6/0x860 [ 557.295509][T21432] ? setup_fault_attr+0x3d0/0x3d0 [ 557.301401][T21432] ? _raw_spin_lock+0xa3/0x1b0 [ 557.306143][T21432] ? __kernfs_new_node+0xdb/0x6d0 [ 557.311142][T21432] should_failslab+0x5/0x20 [ 557.315619][T21432] kmem_cache_alloc+0x36/0x290 [ 557.320358][T21432] __kernfs_new_node+0xdb/0x6d0 [ 557.325186][T21432] ? mutex_lock+0xa6/0x110 [ 557.329676][T21432] ? kernfs_new_node+0x160/0x160 [ 557.334589][T21432] ? kernfs_activate+0x3fc/0x420 [ 557.339524][T21432] kernfs_new_node+0x95/0x160 [ 557.344189][T21432] __kernfs_create_file+0x45/0x260 [ 557.349374][T21432] sysfs_add_file_mode_ns+0x293/0x340 [ 557.354721][T21432] internal_create_group+0x560/0xf10 [ 557.359980][T21432] ? sysfs_create_dir_ns+0x181/0x390 [ 557.365239][T21432] ? sysfs_create_dir_ns+0x1c7/0x390 [ 557.370501][T21432] ? sysfs_create_group+0x20/0x20 [ 557.375501][T21432] sysfs_create_groups+0x5d/0x130 [ 557.380506][T21432] kobject_add_internal+0x708/0xbd0 [ 557.385685][T21432] kobject_init_and_add+0x123/0x190 [ 557.390966][T21432] ? kobject_add+0x210/0x210 [ 557.395548][T21432] ? __irqentry_text_end+0x1fc3fa/0x1fc3fa [ 557.401339][T21432] netdev_queue_update_kobjects+0x16e/0x3c0 [ 557.407228][T21432] netdev_register_kobject+0x263/0x310 [ 557.412749][T21432] register_netdevice+0xbc7/0x1480 [ 557.417837][T21432] ? netdev_update_lockdep_key+0x10/0x10 [ 557.423444][T21432] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 557.428459][T21432] ? __rcu_read_lock+0x50/0x50 [ 557.433200][T21432] ? alloc_netdev_mqs+0xa0c/0xc60 [ 557.438201][T21432] ? vti6_locate+0x551/0x910 [ 557.442782][T21432] vti6_locate+0x610/0x910 [ 557.447175][T21432] ? cap_capable+0x23f/0x280 [ 557.451738][T21432] ? vti6_link_config+0x530/0x530 [ 557.456735][T21432] ? vti6_ioctl+0xa64/0x1b10 [ 557.461300][T21432] vti6_ioctl+0xa88/0x1b10 [ 557.465711][T21432] ? vti6_tnl_xmit+0x1720/0x1720 [ 557.470626][T21432] ? __rcu_read_lock+0x50/0x50 [ 557.475368][T21432] ? check_preemption_disabled+0x154/0x330 [ 557.481149][T21432] ? avc_has_extended_perms+0xb5e/0x1140 [ 557.486771][T21432] ? full_name_hash+0xb4/0xe0 [ 557.491425][T21432] dev_ifsioc+0x675/0xa70 [ 557.495727][T21432] ? mutex_lock+0xa6/0x110 [ 557.500134][T21432] ? dev_ioctl+0xab0/0xab0 [ 557.504546][T21432] dev_ioctl+0x558/0xab0 [ 557.508785][T21432] sock_ioctl+0x677/0x760 [ 557.513091][T21432] ? sock_poll+0x2f0/0x2f0 [ 557.517486][T21432] ? memset+0x1f/0x40 [ 557.521459][T21432] ? fsnotify+0x1332/0x13f0 [ 557.525949][T21432] ? sock_poll+0x2f0/0x2f0 [ 557.530341][T21432] do_vfs_ioctl+0x76a/0x1720 [ 557.534921][T21432] ? selinux_file_ioctl+0x72f/0x990 [ 557.540108][T21432] ? ioctl_preallocate+0x250/0x250 [ 557.545211][T21432] ? __fget+0x37b/0x3c0 [ 557.549345][T21432] ? vfs_write+0x422/0x4e0 [ 557.553736][T21432] ? fget_many+0x20/0x20 [ 557.557954][T21432] ? debug_smp_processor_id+0x20/0x20 [ 557.563298][T21432] ? security_file_ioctl+0x9d/0xb0 [ 557.568387][T21432] __x64_sys_ioctl+0xd4/0x110 [ 557.573041][T21432] do_syscall_64+0xcb/0x1e0 [ 557.577521][T21432] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 557.583406][T21432] RIP: 0033:0x466459 [ 557.587289][T21432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 557.606876][T21432] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 557.615264][T21432] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 557.623210][T21432] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:42 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x12000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x20000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:43 executing program 0 (fault-call:8 fault-nth:95): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 557.631176][T21432] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 557.639120][T21432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 557.647082][T21432] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 557.669488][T21432] kobject_add_internal failed for tx-0 (error: -12 parent: queues) 21:32:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019002500900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:43 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x1000000, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000040)) preadv(r3, &(0x7f0000000080), 0x0, 0xd9f, 0x2) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) 21:32:43 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b27}, @mcast2}}) 21:32:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x25000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 557.719826][T21445] secmark_tg_check: 29 callbacks suppressed [ 557.719832][T21445] xt_SECMARK: invalid mode: 0 [ 557.735800][T21444] EXT4-fs (loop1): Can't read superblock on 2nd try [ 557.765074][T21452] FAULT_INJECTION: forcing a failure. [ 557.765074][T21452] name failslab, interval 1, probability 0, space 0, times 0 [ 557.769487][T21453] xt_SECMARK: invalid mode: 0 [ 557.779974][T21452] CPU: 1 PID: 21452 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 557.792797][T21452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.802832][T21452] Call Trace: [ 557.806195][T21452] dump_stack+0x1d8/0x24e [ 557.810527][T21452] ? devkmsg_release+0x11c/0x11c [ 557.815442][T21452] ? mutex_unlock+0x19/0x40 [ 557.819923][T21452] ? show_regs_print_info+0x12/0x12 [ 557.825132][T21452] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 557.831186][T21452] should_fail+0x6f6/0x860 [ 557.835838][T21452] ? setup_fault_attr+0x3d0/0x3d0 [ 557.840860][T21452] ? _raw_spin_lock+0xa3/0x1b0 [ 557.845641][T21452] ? __kernfs_new_node+0xdb/0x6d0 [ 557.850646][T21452] should_failslab+0x5/0x20 [ 557.855132][T21452] kmem_cache_alloc+0x36/0x290 [ 557.859896][T21452] __kernfs_new_node+0xdb/0x6d0 [ 557.864734][T21452] ? mutex_lock+0xa6/0x110 [ 557.869133][T21452] ? kernfs_new_node+0x160/0x160 [ 557.874057][T21452] ? kernfs_activate+0x3fc/0x420 [ 557.878981][T21452] kernfs_new_node+0x95/0x160 [ 557.883724][T21452] __kernfs_create_file+0x45/0x260 [ 557.888961][T21452] sysfs_add_file_mode_ns+0x293/0x340 [ 557.894446][T21452] internal_create_group+0x560/0xf10 [ 557.899916][T21452] ? sysfs_create_dir_ns+0x181/0x390 [ 557.905180][T21452] ? sysfs_create_dir_ns+0x1c7/0x390 [ 557.910441][T21452] ? sysfs_create_group+0x20/0x20 [ 557.915439][T21452] sysfs_create_groups+0x5d/0x130 [ 557.920472][T21452] kobject_add_internal+0x708/0xbd0 [ 557.925694][T21452] kobject_init_and_add+0x123/0x190 [ 557.930899][T21452] ? kobject_add+0x210/0x210 [ 557.935469][T21452] ? kernfs_get+0x55/0x90 [ 557.939789][T21452] netdev_queue_update_kobjects+0x16e/0x3c0 [ 557.945663][T21452] netdev_register_kobject+0x263/0x310 [ 557.951097][T21452] register_netdevice+0xbc7/0x1480 [ 557.956195][T21452] ? netdev_update_lockdep_key+0x10/0x10 [ 557.961861][T21452] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 557.966873][T21452] ? __rcu_read_lock+0x50/0x50 [ 557.971620][T21452] ? alloc_netdev_mqs+0xa0c/0xc60 [ 557.976634][T21452] ? vti6_locate+0x551/0x910 [ 557.981200][T21452] vti6_locate+0x610/0x910 [ 557.985590][T21452] ? cap_capable+0x23f/0x280 [ 557.990170][T21452] ? vti6_link_config+0x530/0x530 [ 557.995690][T21452] ? vti6_ioctl+0xa64/0x1b10 [ 558.000269][T21452] vti6_ioctl+0xa88/0x1b10 [ 558.004663][T21452] ? vti6_tnl_xmit+0x1720/0x1720 [ 558.009606][T21452] ? __rcu_read_lock+0x50/0x50 [ 558.014347][T21452] ? check_preemption_disabled+0x154/0x330 [ 558.020150][T21452] ? avc_has_extended_perms+0xb5e/0x1140 [ 558.025797][T21452] ? full_name_hash+0xb4/0xe0 [ 558.030461][T21452] dev_ifsioc+0x675/0xa70 [ 558.034796][T21452] ? mutex_lock+0xa6/0x110 [ 558.039284][T21452] ? dev_ioctl+0xab0/0xab0 [ 558.043690][T21452] dev_ioctl+0x558/0xab0 [ 558.048038][T21452] sock_ioctl+0x677/0x760 [ 558.052350][T21452] ? sock_poll+0x2f0/0x2f0 [ 558.056744][T21452] ? memset+0x1f/0x40 [ 558.060703][T21452] ? fsnotify+0x1332/0x13f0 [ 558.065187][T21452] ? sock_poll+0x2f0/0x2f0 [ 558.069577][T21452] do_vfs_ioctl+0x76a/0x1720 [ 558.074300][T21452] ? selinux_file_ioctl+0x72f/0x990 [ 558.079488][T21452] ? ioctl_preallocate+0x250/0x250 [ 558.084706][T21452] ? __fget+0x37b/0x3c0 [ 558.088847][T21452] ? vfs_write+0x422/0x4e0 [ 558.093267][T21452] ? fget_many+0x20/0x20 [ 558.097487][T21452] ? debug_smp_processor_id+0x20/0x20 [ 558.102953][T21452] ? security_file_ioctl+0x9d/0xb0 [ 558.108053][T21452] __x64_sys_ioctl+0xd4/0x110 [ 558.113320][T21452] do_syscall_64+0xcb/0x1e0 [ 558.117811][T21452] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 558.123674][T21452] RIP: 0033:0x466459 [ 558.127547][T21452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 558.147125][T21452] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 558.155525][T21452] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:43 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x5], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:43 executing program 0 (fault-call:8 fault-nth:96): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 558.163471][T21452] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 558.171417][T21452] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 558.179709][T21452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 558.187654][T21452] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 558.197719][T21452] kobject_add_internal failed for tx-0 (error: -12 parent: queues) [ 558.230255][T21457] FAULT_INJECTION: forcing a failure. [ 558.230255][T21457] name failslab, interval 1, probability 0, space 0, times 0 [ 558.243293][T21457] CPU: 0 PID: 21457 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 558.253615][T21457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.263802][T21457] Call Trace: [ 558.267110][T21457] dump_stack+0x1d8/0x24e [ 558.271428][T21457] ? devkmsg_release+0x11c/0x11c [ 558.276362][T21457] ? mutex_unlock+0x19/0x40 [ 558.280844][T21457] ? show_regs_print_info+0x12/0x12 [ 558.286021][T21457] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 558.292133][T21457] should_fail+0x6f6/0x860 [ 558.296671][T21457] ? setup_fault_attr+0x3d0/0x3d0 [ 558.301698][T21457] ? _raw_spin_lock+0xa3/0x1b0 [ 558.306450][T21457] ? __kernfs_new_node+0xdb/0x6d0 [ 558.311458][T21457] should_failslab+0x5/0x20 [ 558.315953][T21457] kmem_cache_alloc+0x36/0x290 [ 558.320724][T21457] __kernfs_new_node+0xdb/0x6d0 [ 558.325556][T21457] ? mutex_lock+0xa6/0x110 [ 558.329955][T21457] ? kernfs_new_node+0x160/0x160 [ 558.335495][T21457] ? kernfs_activate+0x3fc/0x420 [ 558.340418][T21457] kernfs_new_node+0x95/0x160 [ 558.345101][T21457] __kernfs_create_file+0x45/0x260 [ 558.350200][T21457] sysfs_add_file_mode_ns+0x293/0x340 [ 558.355575][T21457] internal_create_group+0x560/0xf10 [ 558.360860][T21457] ? sysfs_create_dir_ns+0x181/0x390 [ 558.366134][T21457] ? sysfs_create_dir_ns+0x1c7/0x390 [ 558.371396][T21457] ? sysfs_create_group+0x20/0x20 [ 558.376400][T21457] sysfs_create_groups+0x5d/0x130 [ 558.381410][T21457] kobject_add_internal+0x708/0xbd0 [ 558.386595][T21457] kobject_init_and_add+0x123/0x190 [ 558.391800][T21457] ? kobject_add+0x210/0x210 [ 558.396380][T21457] ? kernfs_get+0x55/0x90 [ 558.400716][T21457] netdev_queue_update_kobjects+0x16e/0x3c0 [ 558.406600][T21457] netdev_register_kobject+0x263/0x310 [ 558.412043][T21457] register_netdevice+0xbc7/0x1480 [ 558.417138][T21457] ? netdev_update_lockdep_key+0x10/0x10 [ 558.422756][T21457] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 558.427765][T21457] ? __rcu_read_lock+0x50/0x50 [ 558.432532][T21457] ? alloc_netdev_mqs+0xa0c/0xc60 [ 558.437706][T21457] ? vti6_locate+0x551/0x910 [ 558.442274][T21457] vti6_locate+0x610/0x910 [ 558.446672][T21457] ? cap_capable+0x23f/0x280 [ 558.451242][T21457] ? vti6_link_config+0x530/0x530 [ 558.456252][T21457] ? vti6_ioctl+0xa64/0x1b10 [ 558.460818][T21457] vti6_ioctl+0xa88/0x1b10 [ 558.465221][T21457] ? vti6_tnl_xmit+0x1720/0x1720 [ 558.470145][T21457] ? __rcu_read_lock+0x50/0x50 [ 558.474911][T21457] ? check_preemption_disabled+0x154/0x330 [ 558.480782][T21457] ? avc_has_extended_perms+0xb5e/0x1140 [ 558.486396][T21457] ? full_name_hash+0xb4/0xe0 [ 558.491054][T21457] dev_ifsioc+0x675/0xa70 [ 558.495361][T21457] ? mutex_lock+0xa6/0x110 [ 558.499753][T21457] ? dev_ioctl+0xab0/0xab0 [ 558.504180][T21457] dev_ioctl+0x558/0xab0 [ 558.512577][T21457] sock_ioctl+0x677/0x760 [ 558.516886][T21457] ? sock_poll+0x2f0/0x2f0 [ 558.521282][T21457] ? memset+0x1f/0x40 [ 558.525273][T21457] ? fsnotify+0x1332/0x13f0 [ 558.529778][T21457] ? sock_poll+0x2f0/0x2f0 [ 558.534209][T21457] do_vfs_ioctl+0x76a/0x1720 [ 558.538793][T21457] ? selinux_file_ioctl+0x72f/0x990 [ 558.543970][T21457] ? ioctl_preallocate+0x250/0x250 [ 558.549059][T21457] ? __fget+0x37b/0x3c0 [ 558.553193][T21457] ? vfs_write+0x422/0x4e0 [ 558.557593][T21457] ? fget_many+0x20/0x20 [ 558.561820][T21457] ? debug_smp_processor_id+0x20/0x20 [ 558.567184][T21457] ? security_file_ioctl+0x9d/0xb0 [ 558.572281][T21457] __x64_sys_ioctl+0xd4/0x110 [ 558.576945][T21457] do_syscall_64+0xcb/0x1e0 [ 558.581518][T21457] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 558.587407][T21457] RIP: 0033:0x466459 [ 558.591629][T21457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 558.611213][T21457] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 558.619746][T21457] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 21:32:43 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 558.627710][T21457] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 558.635690][T21457] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 558.643640][T21457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 558.651675][T21457] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x40000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:43 executing program 0 (fault-call:8 fault-nth:97): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:44 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b28}, @mcast2}}) [ 558.683403][T21465] xt_SECMARK: invalid mode: 0 [ 558.689756][T21457] kobject_add_internal failed for tx-0 (error: -12 parent: queues) [ 558.691672][T21469] xt_SECMARK: invalid mode: 0 [ 558.702755][T21467] xt_check_table_hooks: 6 callbacks suppressed [ 558.702761][T21467] x_tables: duplicate underflow at hook 2 21:32:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x48000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 558.738975][T21468] EXT4-fs (loop1): Can't read superblock on 2nd try [ 558.760861][T21458] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 558.761625][T21479] x_tables: duplicate underflow at hook 2 [ 558.777108][T21478] FAULT_INJECTION: forcing a failure. [ 558.777108][T21478] name failslab, interval 1, probability 0, space 0, times 0 [ 558.785493][T21480] xt_SECMARK: invalid mode: 0 [ 558.791767][T21478] CPU: 1 PID: 21478 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 558.804698][T21478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.814738][T21478] Call Trace: [ 558.818453][T21478] dump_stack+0x1d8/0x24e [ 558.822762][T21478] ? devkmsg_release+0x11c/0x11c [ 558.827934][T21478] ? mutex_unlock+0x19/0x40 [ 558.832421][T21478] ? show_regs_print_info+0x12/0x12 [ 558.837592][T21478] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 558.843641][T21478] should_fail+0x6f6/0x860 [ 558.848082][T21478] ? setup_fault_attr+0x3d0/0x3d0 [ 558.853437][T21478] ? _raw_spin_lock+0xa3/0x1b0 [ 558.858910][T21478] ? __kernfs_new_node+0xdb/0x6d0 [ 558.863926][T21478] should_failslab+0x5/0x20 [ 558.868411][T21478] kmem_cache_alloc+0x36/0x290 [ 558.873259][T21478] __kernfs_new_node+0xdb/0x6d0 [ 558.878087][T21478] ? mutex_lock+0xa6/0x110 [ 558.882479][T21478] ? kernfs_new_node+0x160/0x160 [ 558.887389][T21478] ? kernfs_activate+0x3fc/0x420 [ 558.892398][T21478] kernfs_new_node+0x95/0x160 [ 558.897052][T21478] __kernfs_create_file+0x45/0x260 [ 558.902163][T21478] sysfs_add_file_mode_ns+0x293/0x340 [ 558.907519][T21478] internal_create_group+0x560/0xf10 [ 558.912783][T21478] ? sysfs_create_dir_ns+0x181/0x390 [ 558.918038][T21478] ? sysfs_create_dir_ns+0x1c7/0x390 [ 558.923292][T21478] ? sysfs_create_group+0x20/0x20 [ 558.928301][T21478] sysfs_create_groups+0x5d/0x130 [ 558.933319][T21478] kobject_add_internal+0x708/0xbd0 [ 558.938493][T21478] kobject_init_and_add+0x123/0x190 [ 558.943664][T21478] ? kobject_add+0x210/0x210 [ 558.948227][T21478] ? kernfs_get+0x55/0x90 [ 558.952533][T21478] netdev_queue_update_kobjects+0x16e/0x3c0 [ 558.958492][T21478] netdev_register_kobject+0x263/0x310 [ 558.963947][T21478] register_netdevice+0xbc7/0x1480 [ 558.969211][T21478] ? netdev_update_lockdep_key+0x10/0x10 [ 558.974828][T21478] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 558.979826][T21478] ? __rcu_read_lock+0x50/0x50 [ 558.984561][T21478] ? alloc_netdev_mqs+0xa0c/0xc60 [ 558.989579][T21478] ? vti6_locate+0x551/0x910 [ 558.994140][T21478] vti6_locate+0x610/0x910 [ 558.998546][T21478] ? cap_capable+0x23f/0x280 [ 559.003108][T21478] ? vti6_link_config+0x530/0x530 [ 559.008121][T21478] ? vti6_ioctl+0xa64/0x1b10 [ 559.014512][T21478] vti6_ioctl+0xa88/0x1b10 [ 559.018920][T21478] ? vti6_tnl_xmit+0x1720/0x1720 [ 559.023836][T21478] ? __rcu_read_lock+0x50/0x50 [ 559.028602][T21478] ? check_preemption_disabled+0x154/0x330 [ 559.034396][T21478] ? avc_has_extended_perms+0xb5e/0x1140 [ 559.040000][T21478] ? full_name_hash+0xb4/0xe0 [ 559.044651][T21478] dev_ifsioc+0x675/0xa70 [ 559.048956][T21478] ? mutex_lock+0xa6/0x110 [ 559.053343][T21478] ? dev_ioctl+0xab0/0xab0 [ 559.057733][T21478] dev_ioctl+0x558/0xab0 [ 559.061948][T21478] sock_ioctl+0x677/0x760 [ 559.066270][T21478] ? sock_poll+0x2f0/0x2f0 [ 559.070756][T21478] ? memset+0x1f/0x40 [ 559.074728][T21478] ? fsnotify+0x1332/0x13f0 [ 559.079208][T21478] ? sock_poll+0x2f0/0x2f0 [ 559.083599][T21478] do_vfs_ioctl+0x76a/0x1720 [ 559.088165][T21478] ? selinux_file_ioctl+0x72f/0x990 [ 559.093347][T21478] ? ioctl_preallocate+0x250/0x250 [ 559.098430][T21478] ? __fget+0x37b/0x3c0 [ 559.102566][T21478] ? vfs_write+0x422/0x4e0 [ 559.106957][T21478] ? fget_many+0x20/0x20 [ 559.111175][T21478] ? debug_smp_processor_id+0x20/0x20 [ 559.116520][T21478] ? security_file_ioctl+0x9d/0xb0 [ 559.121612][T21478] __x64_sys_ioctl+0xd4/0x110 [ 559.126275][T21478] do_syscall_64+0xcb/0x1e0 [ 559.130756][T21478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 559.136620][T21478] RIP: 0033:0x466459 [ 559.140494][T21478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 559.160070][T21478] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 559.168454][T21478] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 559.176400][T21478] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 21:32:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4c000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 559.184344][T21478] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 559.192287][T21478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 559.200230][T21478] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 [ 559.210945][T21478] kobject_add_internal failed for tx-0 (error: -12 parent: queues) [ 559.227773][T21459] EXT4-fs (loop2): re-mounted. Opts: (null) [ 559.233824][T21487] x_tables: duplicate underflow at hook 2 21:32:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019002e00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:44 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:44 executing program 0 (fault-call:8 fault-nth:98): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:44 executing program 2: fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)=0x5) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x10d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r2) setresgid(0x0, r2, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) setresgid(0x0, r4, 0x0) r5 = getegid() lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0xb}, [{0x2, 0x2, 0xee00}, {}], {0x4, 0x5}, [{0x8, 0x6, r2}, {0x8, 0x0, 0xee00}, {0x8, 0x2, 0xee00}, {0x8, 0x2, r4}, {0x8, 0x2, r5}, {0x8, 0x0, 0xee00}], {}, {0x20, 0x1}}, 0x64, 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) fdatasync(r0) 21:32:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x60000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 559.241104][T21468] EXT4-fs (loop1): Can't read superblock on 2nd try [ 559.262216][T21491] x_tables: duplicate underflow at hook 2 [ 559.314876][T21495] FAULT_INJECTION: forcing a failure. [ 559.314876][T21495] name failslab, interval 1, probability 0, space 0, times 0 [ 559.331576][T21497] xt_SECMARK: invalid mode: 0 [ 559.334873][T21495] CPU: 1 PID: 21495 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 559.342219][T21503] x_tables: duplicate underflow at hook 2 [ 559.346532][T21495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.346536][T21495] Call Trace: [ 559.346558][T21495] dump_stack+0x1d8/0x24e [ 559.346576][T21495] ? devkmsg_release+0x11c/0x11c [ 559.361604][T21504] xt_SECMARK: invalid mode: 0 [ 559.362341][T21495] ? mutex_unlock+0x19/0x40 [ 559.362360][T21495] ? show_regs_print_info+0x12/0x12 [ 559.389274][T21495] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 559.395324][T21495] should_fail+0x6f6/0x860 [ 559.399906][T21495] ? setup_fault_attr+0x3d0/0x3d0 [ 559.404908][T21495] ? _raw_spin_lock+0xa3/0x1b0 [ 559.409653][T21495] ? __kernfs_new_node+0xdb/0x6d0 [ 559.414710][T21495] should_failslab+0x5/0x20 [ 559.419247][T21495] kmem_cache_alloc+0x36/0x290 [ 559.424012][T21495] __kernfs_new_node+0xdb/0x6d0 [ 559.428900][T21495] ? mutex_lock+0xa6/0x110 [ 559.433457][T21495] ? kernfs_new_node+0x160/0x160 [ 559.438619][T21495] ? kernfs_activate+0x3fc/0x420 [ 559.443540][T21495] kernfs_new_node+0x95/0x160 [ 559.448206][T21495] __kernfs_create_file+0x45/0x260 [ 559.453301][T21495] sysfs_add_file_mode_ns+0x293/0x340 [ 559.458657][T21495] internal_create_group+0x560/0xf10 [ 559.463965][T21495] ? sysfs_create_dir_ns+0x181/0x390 [ 559.469236][T21495] ? sysfs_create_dir_ns+0x1c7/0x390 [ 559.474504][T21495] ? sysfs_create_group+0x20/0x20 [ 559.479515][T21495] sysfs_create_groups+0x5d/0x130 [ 559.484530][T21495] kobject_add_internal+0x708/0xbd0 [ 559.489745][T21495] kobject_init_and_add+0x123/0x190 [ 559.494969][T21495] ? kobject_add+0x210/0x210 [ 559.499538][T21495] ? kernfs_get+0x55/0x90 [ 559.503857][T21495] netdev_queue_update_kobjects+0x16e/0x3c0 [ 559.509745][T21495] netdev_register_kobject+0x263/0x310 [ 559.515218][T21495] register_netdevice+0xbc7/0x1480 [ 559.520323][T21495] ? netdev_update_lockdep_key+0x10/0x10 [ 559.525951][T21495] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 559.530983][T21495] ? __rcu_read_lock+0x50/0x50 [ 559.535754][T21495] ? alloc_netdev_mqs+0xa0c/0xc60 [ 559.540765][T21495] ? vti6_locate+0x551/0x910 [ 559.545414][T21495] vti6_locate+0x610/0x910 [ 559.549884][T21495] ? cap_capable+0x23f/0x280 [ 559.554473][T21495] ? vti6_link_config+0x530/0x530 [ 559.559473][T21495] ? vti6_ioctl+0xa64/0x1b10 [ 559.564045][T21495] vti6_ioctl+0xa88/0x1b10 [ 559.568499][T21495] ? vti6_tnl_xmit+0x1720/0x1720 [ 559.573433][T21495] ? __rcu_read_lock+0x50/0x50 [ 559.578184][T21495] ? check_preemption_disabled+0x154/0x330 [ 559.583984][T21495] ? avc_has_extended_perms+0xb5e/0x1140 [ 559.589634][T21495] ? full_name_hash+0xb4/0xe0 [ 559.594307][T21495] dev_ifsioc+0x675/0xa70 [ 559.598634][T21495] ? mutex_lock+0xa6/0x110 [ 559.603037][T21495] ? dev_ioctl+0xab0/0xab0 [ 559.607446][T21495] dev_ioctl+0x558/0xab0 [ 559.611673][T21495] sock_ioctl+0x677/0x760 [ 559.615978][T21495] ? sock_poll+0x2f0/0x2f0 [ 559.620374][T21495] ? memset+0x1f/0x40 [ 559.624347][T21495] ? fsnotify+0x1332/0x13f0 [ 559.628832][T21495] ? sock_poll+0x2f0/0x2f0 [ 559.633244][T21495] do_vfs_ioctl+0x76a/0x1720 [ 559.637816][T21495] ? selinux_file_ioctl+0x72f/0x990 [ 559.642994][T21495] ? ioctl_preallocate+0x250/0x250 [ 559.648174][T21495] ? __fget+0x37b/0x3c0 [ 559.652461][T21495] ? vfs_write+0x422/0x4e0 [ 559.656872][T21495] ? fget_many+0x20/0x20 [ 559.661116][T21495] ? debug_smp_processor_id+0x20/0x20 [ 559.666483][T21495] ? security_file_ioctl+0x9d/0xb0 [ 559.671582][T21495] __x64_sys_ioctl+0xd4/0x110 [ 559.676238][T21495] do_syscall_64+0xcb/0x1e0 [ 559.680720][T21495] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 559.686589][T21495] RIP: 0033:0x466459 [ 559.690470][T21495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 21:32:45 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x8], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x68000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b29}, @mcast2}}) 21:32:45 executing program 0 (fault-call:8 fault-nth:99): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 559.710118][T21495] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 559.718513][T21495] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 559.726476][T21495] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 559.734517][T21495] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 559.742507][T21495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 559.750485][T21495] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6c000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x800, 0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000380)={[{@nfs_export_off}, {@index_off}, {@index_off}], [{@euid_gt={'euid>', r1}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@dont_appraise}, {@obj_type={'obj_type', 0x3d, '\\]['}}, {@obj_type}]}) [ 559.769368][T21495] kobject_add_internal failed for tx-0 (error: -12 parent: queues) [ 559.799816][T21500] EXT4-fs (loop1): Can't read superblock on 2nd try [ 559.801741][T21501] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 21:32:45 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x9], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 559.818138][T21511] x_tables: duplicate underflow at hook 2 [ 559.835768][T21514] xt_SECMARK: invalid mode: 0 [ 559.856271][T21518] xt_SECMARK: invalid mode: 0 [ 559.860407][T21520] x_tables: duplicate underflow at hook 2 [ 559.874953][T21513] FAULT_INJECTION: forcing a failure. [ 559.874953][T21513] name failslab, interval 1, probability 0, space 0, times 0 [ 559.887860][T21513] CPU: 1 PID: 21513 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 559.898359][T21513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.908429][T21513] Call Trace: [ 559.911724][T21513] dump_stack+0x1d8/0x24e [ 559.916045][T21513] ? devkmsg_release+0x11c/0x11c [ 559.921258][T21513] ? show_regs_print_info+0x12/0x12 [ 559.926724][T21513] ? mutex_lock+0xa6/0x110 [ 559.931139][T21513] ? mutex_trylock+0xb0/0xb0 [ 559.935706][T21513] ? idr_get_free+0x740/0x900 [ 559.940360][T21513] should_fail+0x6f6/0x860 [ 559.944754][T21513] ? setup_fault_attr+0x3d0/0x3d0 [ 559.949757][T21513] ? selinux_kernfs_init_security+0x1b2/0x7e0 [ 559.955802][T21513] ? __kernfs_new_node+0xdb/0x6d0 [ 559.960803][T21513] should_failslab+0x5/0x20 [ 559.965283][T21513] kmem_cache_alloc+0x36/0x290 [ 559.970023][T21513] __kernfs_new_node+0xdb/0x6d0 [ 559.974856][T21513] ? kernfs_new_node+0x160/0x160 [ 559.979769][T21513] ? security_kernfs_init_security+0x9a/0xb0 [ 559.985724][T21513] ? mutex_lock+0xa6/0x110 [ 559.990113][T21513] ? mutex_trylock+0xb0/0xb0 [ 559.994681][T21513] kernfs_new_node+0x95/0x160 [ 559.999336][T21513] __kernfs_create_file+0x45/0x260 [ 560.004424][T21513] sysfs_add_file_mode_ns+0x293/0x340 [ 560.009775][T21513] internal_create_group+0x560/0xf10 [ 560.015036][T21513] ? kobject_add+0x210/0x210 [ 560.019604][T21513] ? sysfs_create_group+0x20/0x20 [ 560.024605][T21513] ? kernfs_get+0x55/0x90 [ 560.028918][T21513] netdev_queue_update_kobjects+0x18c/0x3c0 [ 560.034788][T21513] netdev_register_kobject+0x263/0x310 [ 560.040223][T21513] register_netdevice+0xbc7/0x1480 [ 560.045311][T21513] ? netdev_update_lockdep_key+0x10/0x10 [ 560.050919][T21513] ? xdp_rxq_info_reg+0x18e/0x2f0 [ 560.055932][T21513] ? __rcu_read_lock+0x50/0x50 [ 560.060692][T21513] ? alloc_netdev_mqs+0xa0c/0xc60 [ 560.065695][T21513] ? vti6_locate+0x551/0x910 [ 560.070257][T21513] vti6_locate+0x610/0x910 [ 560.074652][T21513] ? cap_capable+0x23f/0x280 [ 560.079233][T21513] ? vti6_link_config+0x530/0x530 [ 560.084234][T21513] ? vti6_ioctl+0xa64/0x1b10 [ 560.088798][T21513] vti6_ioctl+0xa88/0x1b10 [ 560.093198][T21513] ? vti6_tnl_xmit+0x1720/0x1720 [ 560.098111][T21513] ? avc_has_extended_perms+0xb5e/0x1140 [ 560.103717][T21513] ? full_name_hash+0xb4/0xe0 [ 560.108367][T21513] dev_ifsioc+0x675/0xa70 [ 560.112691][T21513] ? mutex_lock+0x106/0x110 [ 560.117166][T21513] ? dev_ioctl+0xab0/0xab0 [ 560.121580][T21513] dev_ioctl+0x558/0xab0 [ 560.125795][T21513] sock_ioctl+0x677/0x760 [ 560.130095][T21513] ? sock_poll+0x2f0/0x2f0 [ 560.134484][T21513] ? memset+0x1f/0x40 [ 560.138462][T21513] ? fsnotify+0x1332/0x13f0 [ 560.143372][T21513] ? sock_poll+0x2f0/0x2f0 [ 560.147762][T21513] do_vfs_ioctl+0x76a/0x1720 [ 560.152328][T21513] ? selinux_file_ioctl+0x72f/0x990 [ 560.157519][T21513] ? ioctl_preallocate+0x250/0x250 [ 560.162608][T21513] ? __fget+0x37b/0x3c0 [ 560.166737][T21513] ? vfs_write+0x422/0x4e0 [ 560.171128][T21513] ? fget_many+0x20/0x20 [ 560.175346][T21513] ? debug_smp_processor_id+0x20/0x20 [ 560.180798][T21513] ? security_file_ioctl+0x9d/0xb0 [ 560.185881][T21513] __x64_sys_ioctl+0xd4/0x110 [ 560.190533][T21513] do_syscall_64+0xcb/0x1e0 [ 560.195013][T21513] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 560.200882][T21513] RIP: 0033:0x466459 [ 560.204781][T21513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 560.224362][T21513] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 560.232747][T21513] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 560.240802][T21513] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 560.248749][T21513] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000 [ 560.256698][T21513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 560.264662][T21513] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000 21:32:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019004800900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x74000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2a}, @mcast2}}) 21:32:45 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xa], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:45 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x3ff}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4dd}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x3}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x40) 21:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7a000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 560.287925][T21519] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 560.298744][T21526] xt_SECMARK: invalid mode: 0 [ 560.300436][T21500] EXT4-fs (loop1): Can't read superblock on 2nd try [ 560.312630][T21519] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:45 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:45 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xb], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xa0040000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xc], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 560.344540][T21532] x_tables: duplicate underflow at hook 2 [ 560.384348][T21540] x_tables: duplicate underflow at hook 2 21:32:45 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x2}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) [ 560.410130][T21544] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 560.432683][T21553] x_tables: duplicate underflow at hook 2 [ 560.470515][T21552] EXT4-fs (loop1): Can't read superblock on 2nd try [ 560.481808][T21559] EXT4-fs (loop2): unsupported descriptor size 0 [ 560.532259][T21559] EXT4-fs (loop2): unsupported descriptor size 0 [ 560.540957][T21552] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019004c00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:45 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2b}, @mcast2}}) 21:32:45 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4b47, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:45 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xd], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x1400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x104e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYRESOCT]) r2 = dup(r1) r3 = open(&(0x7f0000000140)='./file0\x00', 0x224580, 0x2) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f00000000c0)={0x14, 0x8000000b, 0x15, 0x13, 0x6, 0x6, 0x3, 0xcb, 0xffffffffffffffff}) chdir(&(0x7f0000000280)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r2) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x50, 0x24, 0xd8b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, {0xa, 0x2, [0x0, 0x0, 0x0]}}]}]}, 0x50}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x60, r5, 0x804, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x4) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) fdatasync(r1) 21:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xc0050000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xe], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4b49, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xf8010000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:45 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5421, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:45 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x10], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2c}, @mcast2}}) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5450, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x11], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 560.770913][T21595] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 560.782715][T21593] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rmdir(&(0x7f0000000040)='./file0\x00') link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x2], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2d}, @mcast2}}) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5451, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 560.905405][T21606] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 560.919500][T21593] EXT4-fs (loop1): Can't read superblock on 2nd try [ 560.928745][T21595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21595 comm=syz-executor.2 21:32:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006800900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x12], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x3], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x25], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006c00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5452, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2e}, @mcast2}}) 21:32:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 561.044189][T21627] EXT4-fs (loop1): Can't read superblock on 2nd try [ 561.068756][T21629] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5460, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x5], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019007400900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x48], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, &(0x7f0000000140), 0x1000, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)) ftruncate(r1, 0x7) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000040)) fcntl$setstatus(r2, 0x4, 0x80400) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x200000, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000040)=""/66) chroot(&(0x7f0000000140)='./file0\x00') 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8910, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4c], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2f}, @mcast2}}) [ 561.148804][T21629] EXT4-fs (loop2): re-mounted. Opts: (null) [ 561.163753][T21646] EXT4-fs (loop1): Can't read superblock on 2nd try [ 561.176135][T21629] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x120, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) openat(r0, &(0x7f0000000040)='./file0\x00', 0x2, 0xc0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)={0x6, 0x2b, 0x4, 0x0, 0x3}) r2 = signalfd(r1, &(0x7f00000000c0)={[0x5]}, 0x8) fdatasync(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x1, r0, 0x5}) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8911, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x60], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x68], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 561.269027][T21667] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019007a00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8913, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b30}, @mcast2}}) 21:32:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6c], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 561.352608][T21686] EXT4-fs (loop2): couldn't mount RDWR because of unsupported optional features (12610000) [ 561.367361][T21667] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891d, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) clock_gettime(0x0, &(0x7f0000000840)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/174, 0xae}], 0x1}, 0x7}, {{&(0x7f0000000280)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000300)=""/36, 0x24}], 0x1, &(0x7f0000000380)=""/229, 0xe5}, 0x1}, {{&(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/220, 0xdc}, {&(0x7f0000000600)=""/151, 0x97}], 0x2, &(0x7f0000000700)=""/118, 0x76}}], 0x3, 0x141, &(0x7f0000000880)={r1, r2+60000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891e, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x71], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x9], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x74], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 561.512946][T21686] EXT4-fs (loop2): Unrecognized mount option "" or missing value [ 561.520904][T21713] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e300900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xa], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b31}, @mcast2}}) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7a], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xba], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="ddff000000000082e36724e6f24caa846e0800"/31, 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x210000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize}, {}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x9}}], [{@smackfshat={'smackfshat', 0x3d, 'ext4\x00'}}]}}) move_mount(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000380)='./file0\x00', 0x11) fdatasync(r0) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8920, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 561.607488][T21713] EXT4-fs (loop1): Can't read superblock on 2nd try [ 561.616967][T21730] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 561.635564][T21730] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xb], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xdb], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8921, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:46 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 561.671930][T21744] EXT4-fs (loop1): Can't read superblock on 2nd try [ 561.736807][T21765] ip6_vti0: mtu greater than device maximum [ 561.748451][T21766] ip6_vti0: mtu greater than device maximum 21:32:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b32}, @mcast2}}) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xc], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e400900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:47 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$msdos(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x6, 0x2, &(0x7f00000004c0)=[{&(0x7f00000003c0)="08c3c76018711b084313b18d75516efe9cc12afa73fedbbb47fdfb8759b72749c992765d7feb38e5584cc2e9810f3df754999531d20da35cd86d8ae1090c42d0c49bdf2dee97f6759f7669e45e99cdd6e372cc7743f5c9428473af5aba918395dd2d23eb138ff04786a6ab31fa6fc93eee80401748729674a0a75ec930fb63bf77b46fde458c97b677b22a0b23e09d9ec4772a89fa9f7c22caba5268a13c55bf19bc5f449dade0547dcff178135a440dd39f6c45269743ca", 0xb8, 0x800}, {&(0x7f0000000480)="0f14d8d1339367", 0x7, 0x8}], 0x200000, &(0x7f0000000040)={[{@nodots}, {@fat=@quiet}], [{@mask={'mask', 0x3d, 'MAY_READ'}}]}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)=ANY=[@ANYBLOB="00fb4b01ffae62c7687cad3b4db97fb2fdbaf5c4f98ac013a48e90e2bf81287b96d695ca4f50b3bba01ea524c6f88f82cce77c90c606e29bc1db611ca90bb420a8e4d9335afcad8ec53ad5"], 0x4b, 0x3) fdatasync(r0) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x114], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 561.789077][T21768] EXT4-fs (loop2): unsupported descriptor size 0 [ 561.795624][T21744] EXT4-fs (loop1): Can't read superblock on 2nd try [ 561.796828][T21768] fuse: Bad value for 'fd' [ 561.813399][T21775] fuse: Bad value for 'fd' 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8924, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xd], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x134], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xe], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e500900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 561.902626][T21785] EXT4-fs (loop1): Can't read superblock on 2nd try [ 561.910056][T21784] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 561.935367][T21784] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:47 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000040)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4dd}, {&(0x7f0000000280)="02000000030000000400000019000f006200040000000000000000000f002e89cdc9d24fd25f4d20e47fba683248fbc15b65db8deb19ea7a54412f0e7334fca1a4a352fb52fb991c6244156becfebb1ff01f8bbf6d83175113d2d5b5968c00000000000000000000000000000000382c386c824f5b0f6ad9a3f865e5a6c8c794a4a2dcae810ed96a59e615f23f5e274ff94c12e20883dbfba90f690010c9f49e1419316e12fb48fd9debc4253bda2959b7a645472b302e0af15e867705aa9041b72e92b02cef8e8f19dc0a50d0a847c0cac185c1b670", 0xd6, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4403}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b33}, @mcast2}}) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x140], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8929, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8930, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8931, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 561.949608][T21785] EXT4-fs (loop1): Can't read superblock on 2nd try [ 561.965378][T21801] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8932, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b34}, @mcast2}}) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x10], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x15a], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 562.052671][T21809] EXT4-fs (loop1): Can't read superblock on 2nd try [ 562.097352][T21809] EXT4-fs (loop1): Can't read superblock on 2nd try [ 562.110452][T21829] EXT4-fs (loop2): unsupported descriptor size 0 21:32:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000402900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:47 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x2) syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x3, 0x3, &(0x7f0000000500)=[{&(0x7f0000000280)="212c69438cdf95b02628270edba87279c3cf6b6bc2cc99dba1c0de50fc6d2b0c5bb7c3e3b87fa430888b5a64c4604cffbffda2d782b41930259f0ba038932e6cbdd6db3c5eee3d77cea4e8a0181cf80015ab7bc3d7d08dafea0550a6b619768f912bd405b9d0e6fcdb1c673efd8801757c57f24c36d0290abc82e29afe5406a3669e61091e9422f9f057509b4a4614a13750eac9710debe0ac4ff39bdfe3cc295b97e17be76c828a34a13cd766e64d3954450abf55ba28a96e8150325713317d0cedab6d8c332c3df930871fc1205b1a0ecf596123b6cce7dbb2f45812204fef5a12e4dadf95934ba3", 0xe9, 0x4dda}, {&(0x7f0000000380)="2a0da60281938299a823acd31638113d2ec247d9ab9d9aa8ab8d8fb15e1e1d5d956ad1a601b8516e78d30cc0b4acccac5a5748be017f4aa234e90d8e262bf65072b7a7d9c4fe0e4ae7199349328bcb6baad1879a7d45838a5a93ef20017f314117ecd9566249f90acf268f2cfdb6501f15d2228949066794bb2206744ab11cf391783e6a142d2f3a14abd8ff7a92afacf2681a0dcf5ebfef70b3ea93b60f86f2c7aa2be18844ad82113b1ec8c76192888313549357e57c2b0762322839c57184744c512952fb36e079", 0xc9, 0x9}, {&(0x7f0000000480)="a56bac680795d04a7e69f63901e8e9547df6333c07eecf9c38f38f6d1657ff4f0490cca73acf320df54018275a21897218dd327f10c8b4ae2faeac5578c4f37cf834ff0588f9982d29eadada66c76501ccbddb24e4fc6d43f06b5850371fd58d04e502", 0x63}], 0x2, &(0x7f0000000140)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xee01}}], [{@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@measure}]}) open(&(0x7f0000000580)='./file0\x00', 0x40, 0x40) fdatasync(r0) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x11], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x17f], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b35}, @mcast2}}) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x12], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8937, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1bf], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x25], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 562.199610][T21829] EXT4-fs (loop2): unsupported descriptor size 0 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8942, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x48], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000003900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 562.271503][T21850] EXT4-fs (loop1): Can't read superblock on 2nd try [ 562.289243][T21866] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 562.318311][T21866] EXT4-fs (loop2): re-mounted. Opts: (null) [ 562.324284][T21850] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1e4], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8943, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x45f3, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019000000900100000f0000090000000002100000060000000000080000655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000006f92f39b60ab97fc1d6a31600c9840acdbfff7829f20a869914ce4e10522f98671e5c69f0a3c347443246959", 0x92, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed410063a23cf0b2afbfb65fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x4000, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b36}, @mcast2}}) 21:32:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000204900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x60], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1f8], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x226], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 562.363112][T21866] EXT4-fs (loop2): re-mounted. Opts: (null) [ 562.369073][T21883] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 2: r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x2c0064, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x9, 0xa902) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000080)={0x4, 0x3}) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x236], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x68], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8948, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x265], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 562.456487][T21901] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 562.472829][T21895] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b37}, @mcast2}}) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8949, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000604900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x28c], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x74], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7a], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 2: sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x26}, @void, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8084}, 0x24000000) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x4, &(0x7f0000000200)=[{&(0x7f00000000c0)="200000000002000019000000900100000f0000000000000002000000060000000000080000800002000000000000005fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000280)="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", 0x107, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000040)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0xff}], 0x300080, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x894a, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x28e], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x1f8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b38}, @mcast2}}) 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x29a], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x300], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8970, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001004900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8971, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 562.637879][T21949] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:47 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2d2], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4a0], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 562.704713][T21949] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:48 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed03b78f86977852e900000000000004008000"/29, 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8990, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b39}, @mcast2}}) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x500], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8991, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2d6], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x5c0], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000005900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 562.823605][T21996] secmark_tg_check: 65 callbacks suppressed [ 562.823611][T21996] xt_SECMARK: invalid mode: 0 [ 562.837000][T22001] xt_SECMARK: invalid mode: 0 [ 562.855905][T21991] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3a}, @mcast2}}) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8992, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2f6], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 562.865736][T21999] EXT4-fs error (device loop2): ext4_fill_super:4590: inode #2: comm syz-executor.2: iget: root inode unallocated [ 562.885741][T21999] EXT4-fs (loop2): get root inode failed [ 562.894514][T21999] EXT4-fs (loop2): mount failed [ 562.896054][T22010] xt_SECMARK: invalid mode: 0 21:32:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000006900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:48 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) open(&(0x7f0000000040)='./file0\x00', 0x4200, 0xfa) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x600], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8993, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 562.920719][T22015] xt_SECMARK: invalid mode: 0 [ 562.932825][T22014] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x300], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8994, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3b}, @mcast2}}) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x700], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x900], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 562.973300][T22026] xt_SECMARK: invalid mode: 0 [ 562.986764][T22030] xt_SECMARK: invalid mode: 0 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8995, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xa00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x358], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 563.024779][T22025] EXT4-fs (loop1): Can't read superblock on 2nd try [ 563.055468][T22048] xt_SECMARK: invalid mode: 0 [ 563.067306][T22050] xt_SECMARK: invalid mode: 0 21:32:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000406900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 563.078920][T22044] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 563.094838][T22025] EXT4-fs (loop1): Can't read superblock on 2nd try [ 563.111014][T22064] xt_SECMARK: invalid mode: 0 [ 563.116481][T22065] xt_SECMARK: invalid mode: 0 21:32:48 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xb00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3e8], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3c}, @mcast2}}) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xc00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3ea], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a3, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 563.146973][T22044] EXT4-fs (loop2): re-mounted. Opts: (null) [ 563.159910][T22067] EXT4-fs (loop2): re-mounted. Opts: (null) [ 563.172012][T22068] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000007900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 563.266107][T22068] EXT4-fs (loop1): Can't read superblock on 2nd try [ 563.291770][T22098] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xd00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3f8], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3d}, @mcast2}}) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000009900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xe00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3fe], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 563.312562][T22106] EXT4-fs (loop1): Can't read superblock on 2nd try [ 563.325512][T22098] EXT4-fs (loop2): re-mounted. Opts: (null) [ 563.350329][T22098] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40049409, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x1100], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x500], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3e}, @mcast2}}) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40086602, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 563.418934][T22115] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:48 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000380), 0x2, 0x406080) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000400)={0x6, &(0x7f00000003c0)=[{0x1, 0x8, 0x15, 0x81}, {0x4, 0xc1, 0x9, 0x4}, {0x1f, 0x0, 0x5, 0x1}, {0x7, 0x20, 0x6, 0x3}, {0x0, 0x7, 0x4, 0x9279}, {0x1, 0x80, 0x8, 0x82}]}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)={0x60, 0x0, 0x10, 0x0, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @void}}, [@mon_options, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x60}, 0x1, 0x0, 0x0, 0x4004000}, 0x44050) sendmsg$NL80211_CMD_FLUSH_PMKSA(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xc16, 0x5c}}}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x840}, 0x8000) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x1200], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x5c0], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900000a900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40087602, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x600], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 563.488269][T22115] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x2000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3f}, @mcast2}}) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6fb], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x2500], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6fc], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 563.565416][T22144] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 563.587930][T22155] EXT4-fs (loop1): Can't read superblock on 2nd try [ 563.595056][T22144] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900000b900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x80086601, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b40}, @mcast2}}) 21:32:48 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x700], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x80087601, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:48 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x20000004e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000140)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES16, @ANYBLOB="bc0d0fdc75cfed3de15dd803c4a005bdc10d456a6d62d933e3d81d25656be088cb07d4fd45552529bac3636e57829e5cd1d36766dff52403035a1aa3ed2f538b4e581a56f10ab86d7b5f82bbfcaf7e8cb274783756a03c1b3208596e9d5f6e801f07f1e509782991d9024c5f9f75fdace5707db81bd4df7bf54c238e0757a06fea5ae804c2309d10e9b28a4b54276774809084f27d7f1169572322ec628c024565b5c8b9bdb957f97523075cd8"]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) r1 = dup(r0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000300)='./file0\x00', r2, 0xffffffffffffffff, 0x800) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x400, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x100}, 0x1c) [ 563.637977][T22155] EXT4-fs (loop1): Can't read superblock on 2nd try [ 563.648563][T22175] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0045878, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x900], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4800], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xa00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 563.722590][T22193] xt_check_table_hooks: 44 callbacks suppressed [ 563.722596][T22193] x_tables: duplicate underflow at hook 2 [ 563.754490][T22188] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xb00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900000c900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0045878, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4c00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 563.795683][T22206] EXT4-fs (loop2): Unrecognized mount option "01777777777777777777777ÿÿ¼ÜuÏí=á]ØÄ ½ÁEjmbÙ3ãØ%ekàˆËÔýEU%)ºÃcnW‚ž\ÑÓgfßõ$Z£í/S‹NXVñ [ 563.795683][T22206] ¸m{_‚»ü¯~Œ²tx7V <2Yn_n€ñå x)‘ÙL_Ÿuý¬åp}¸Ôß{õL#ŽW oêZèÂ0鲊KT'gt€„ò}iW#"ìbŒEeµÈ¹½¹Wùu#\Ø" or missing value [ 563.805383][T22213] x_tables: duplicate underflow at hook 2 [ 563.828538][T22188] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b41}, @mcast2}}) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xc00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 2: ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 21:32:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900000d900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xd00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 563.909205][T22206] EXT4-fs (loop2): Unrecognized mount option "01777777777777777777777ÿÿ¼ÜuÏí=á]ØÄ ½ÁEjmbÙ3ãØ%ekàˆËÔýEU%)ºÃcnW‚ž\ÑÓgfßõ$Z£í/S‹NXVñ [ 563.909205][T22206] ¸m{_‚»ü¯~Œ²tx7V <2Yn_n€ñå x)‘ÙL_Ÿuý¬åp}¸Ôß{õL#ŽW oêZèÂ0鲊KT'gt€„ò}iW#"ìbŒEeµÈ¹½¹Wùu#\Ø" or missing value [ 563.935196][T22229] x_tables: duplicate underflow at hook 2 [ 563.944244][T22228] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6800], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b42}, @mcast2}}) 21:32:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900000e900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 563.983590][T22239] x_tables: duplicate underflow at hook 2 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc020660b, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6c00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xe00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 564.027073][T22248] EXT4-fs (loop1): Can't read superblock on 2nd try [ 564.034384][T22249] x_tables: duplicate underflow at hook 2 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1100], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7400], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x2, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b43}, @mcast2}}) 21:32:49 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file2\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x8}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="0200000077adf7d566aded5c19000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000140)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4404}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) r1 = pidfd_open(0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x8, 0x2) fdatasync(r0) creat(&(0x7f00000000c0)='./file1\x00', 0x0) 21:32:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000410900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1200], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 564.111106][T22244] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 564.120683][T22269] x_tables: duplicate underflow at hook 2 [ 564.137761][T22271] EXT4-fs (loop1): Can't read superblock on 2nd try [ 564.147697][T22244] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7a00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1401], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 564.162546][T22277] EXT4-fs (loop2): re-mounted. Opts: (null) [ 564.189231][T22282] x_tables: duplicate underflow at hook 2 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xa004], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x3, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 564.225402][T22289] EXT4-fs (loop1): Can't read superblock on 2nd try [ 564.245941][T22299] x_tables: duplicate underflow at hook 2 21:32:49 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x10000}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xc005], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2500], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b44}, @mcast2}}) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x4, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 564.269776][T22298] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 564.282709][T22289] EXT4-fs (loop1): Can't read superblock on 2nd try [ 564.288993][T22305] x_tables: duplicate underflow at hook 2 21:32:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019002010900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x5, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3401], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xf801], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x6, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 564.387923][T22320] x_tables: duplicate underflow at hook 2 [ 564.398722][T22327] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:49 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x100) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) unlink(&(0x7f0000000080)='./file0\x00') 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x1000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x7, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b45}, @mcast2}}) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000011900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 564.488978][T22332] EXT4-fs (loop2): unsupported descriptor size 0 [ 564.499457][T22327] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x2000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4001], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x8, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x9, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b46}, @mcast2}}) [ 564.539079][T22332] EXT4-fs (loop2): unsupported descriptor size 0 21:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x3000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 564.627427][T22366] EXT4-fs (loop1): Can't read superblock on 2nd try [ 564.661551][T22366] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x4000, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) chdir(&(0x7f0000000040)='./file1\x00') fdatasync(r0) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xa, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4800], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000012900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b47}, @mcast2}}) [ 564.678503][T22379] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x5000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4c00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xb, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 564.740339][T22379] EXT4-fs error (device loop2): __ext4_new_inode:930: comm syz-executor.2: reserved inode found cleared - inode=1 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xc, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xd, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 564.804991][T22395] EXT4-fs (loop1): Can't read superblock on 2nd try [ 564.813713][T22403] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks) [ 564.905065][T22403] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks) [ 564.915697][T22395] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x80, 0x3, 0x3, 0x201, 0x0, 0x0, {0x1, 0x0, 0x9}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x5}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x7}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x1}}, @NFQA_MARK={0x8}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x10001}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x87}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0xc1e}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xc3de}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x11b}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x7}}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x800) creat(&(0x7f0000000040)='./file0\x00', 0xb0) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xe, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b48}, @mcast2}}) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x5803], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900001f900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x8000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x5a01], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x10, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x9000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000020900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x11, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 565.032003][T22437] EXT4-fs (loop1): Can't read superblock on 2nd try [ 565.055761][T22435] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 565.079404][T22437] EXT4-fs (loop1): Can't read superblock on 2nd try [ 565.083758][T22435] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xa000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b49}, @mcast2}}) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x12, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x17, &(0x7f0000000040)="08c63a89", 0x4) fdatasync(r0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000080)=0x9, 0x4) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000040)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000380)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000280)="b955e1cc97a14dd3f4ec3e0a86c8478adb0fd355064e2a38c933fa4ea648ef6ba55925e0b166718d2787a4559efe64bf89798c3d61be3b9aafd0a04540f66dd93233e51eb0ca0c8a73231b51a9d2f953bf4752fc525605f7fe6c2c36f7f739bd4ecd0e84cacd4b3b54461c849c45e0161c686fbda494328ac1ecbdbaca7bc82de7e7697aad353d813411201f67a367f8ef894ed3e3ae2a3cc6448e2e92c4c92a24beb8a24778ce18ce9f20427b65e30fbf59a2a03f3e41eb37db0078b154389d90ffa741a07283d25b5c06138a4850f696be99822bef", 0xd6, r2}, 0x68) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xb000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x25, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6502], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x29, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 565.170073][T22435] EXT4-fs (loop2): re-mounted. Opts: (null) [ 565.189164][T22463] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001020900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x2f, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xc000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6800], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4a}, @mcast2}}) [ 565.311073][T22463] EXT4-fs (loop1): Can't read superblock on 2nd try [ 565.323381][T22475] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 21:32:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000380)="00000000000000000000000082e36724c6f34caa846e000000000000007e3f6ce11f46afdc28cde57899a71c5f0d4a82597b360d421eb35e790954bf0621e842c6be605430dce8871edd6e589bba4bd5daac753164f13a5a18428f74564018529f006c12aadc4238c57c845e1c94a90c1be5086f126de16671b8015b1c14cbad0bb3f68e87d6065332397126bab495101ff14a04437e", 0x96, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xfff}, {&(0x7f0000000280)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080c55b3c3cd9ffe22f934de62bb990f803d19c7436d7dd6795fc05c22e3ffd8c887b08cd763ec0c3aae657c6f7479aa0f6fdb99e3ef2e57de17ce13b206e6ea9fdaebba9aba37213d1aa357c06cb7579c8e2eba0e66e925d198df543efcfae8bcdda4c3437a41914f80a1f017de72b786357dc37d5733c50e1f0132c8569fa1bd9d578a6976965eb4f06d205af3d652d8e911a7b15539d9de423839753228ad2227a2f842de1e45fabcbf653d7fd9f749953ddb17233a4e49d06d388944f6ded54b4d021d04caddbc61cef0592ee33d7", 0xec, 0x4400}, {&(0x7f0000000540)="2be7744bcff3884e7577f47859cd3d250ce127ec23ecb4a6025e14e4ad2640d7dbc53165499c24160e1bf1d8f38c55ce93b5bc38b0437c6161517c84f5dc8806a4b9a0f535a36e939fb5f72dbcb02f69c7481ead3fe9b2a5d23e7c67beb84409784351bfdb52e1789248c3a2ef7ddfbbd7b201815a253a58de79f0e953cd3154817ff45aeeb4031dde9f0b61867b39e735fd3639d3d555b14bae4a551907be7153a75094faadecbf5c9570547221060881d4e1bea92cd526a60fd6006938f6ef25fe17dd129518ded09a26f31418205e6c2ce655f4e06fa6576b85b9afdf49ddde73d0489948177269c468d10e33cb61", 0xf0, 0x5}], 0x20c8001, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file0\x00') fdatasync(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x800, 0x4, &(0x7f0000000800)=[{&(0x7f0000000440)="a4ce5f0c2314ac5cc29f57d1e449ef97db9bc6a3f08c87e4d3c39372c461f1ce4a11233872a451212b10c3b7d53adc5eba0a2dad8d951c9c23a620080ba19cbc5bfd20d9c5d157a77682988dbdb010adb6ab2b59b47d428528cf7e0ef936ecb79e1e3e48bdf0319c7bbb754761d9af60d9b9997ffa71b59daad620cf1798a830da1e71dc2839dffeb7436ebb8e9324f3fe6fc1c9dcc4ee84a32c7e435a69017bf10a8d4fe6e8d389e519ecfe62d04545c7b93a62fe576a4242522162a3b8e762f49812", 0xc3, 0x9}, {&(0x7f0000000640)="d0b4faa4a4280b89cb52ffb52f83c8263e10b3e9f4c6f11e22119c491f3a8922f2b0757575278adac990cc9a7f2aabe51fc8fc85776c16b9bf2a93db04fc76614465ed967b42c400ea73d8d020605351272dd8387c280802557b3800ab782fd80711f02acb5f5bd01b05d728fbbd406e20b3e3bcaf282ead927c23048995f6f1e44514edc989df47b2c6dc24e53c559cc36f6883e175f652cf4167d06f1a78b4254ca2aef32467e29b9faa0f6cb69258447bec1b79a4957d282c1eaf69e35a", 0xbf, 0x5}, {&(0x7f0000000700)="70c4d016ae67b546bc6f887834d2e4e4cf5051395c24879074200c391a0c6a83d51744e52d60d9bddcb24b4180e1c59f337bbc58419e62cbc8bd8c0998a0ef2136c9edc3df7c69b6d94c7e4208a2f53923b9758aae", 0x55, 0x3}, {&(0x7f0000000780)="9188cab36f1df449b8ac1f1fa3c218e1d6748c523920f3a86066c0723fc4057e35296ccc60f6296682ff61beab56aa22446066c4dc0c175ddc9d39f16f861c8804c0bb42af5f53", 0x47, 0xd879}], 0x904000, &(0x7f0000000880)={[{@uni_xlate}, {@shortname_winnt}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}, {@shortname_winnt}, {@rodir}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r2}}]}) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xd000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6c00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x3a, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xe000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000022900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7100], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4b}, @mcast2}}) [ 565.366269][T22475] EXT4-fs (loop2): re-mounted. Opts: (null) [ 565.392862][T22501] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x48, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7400], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x10000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x40) fdatasync(r0) 21:32:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4c}, @mcast2}}) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x11000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x4a, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7a00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x4c, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 565.504618][T22525] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000025900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x60, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x12000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7f01], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x20000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x68, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 565.590811][T22525] EXT4-fs (loop1): Can't read superblock on 2nd try [ 565.625281][T22551] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 21:32:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg(r1, &(0x7f000000a300)=[{{&(0x7f0000000040)=@sco={0x1f, @none}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000280)="80c609e48ed1f7c337817c22f423b8cdc7a6206e02f0b9bb22fe79f29cca8af30c4aea26f2ecad4df6f4fd04ce3c5f2dd7d1b0ea883b6cc21a3aadff23a31b72bbf9c9c50fc1ffb6f423bbf2990c88ea5365c898e8317f6221c9ecd45f7488e1833052a1b7ce018c83d787704a8c953ec92ebc1d04d68688c8ab736666395e012bbbd8a36ee285a9b792d481d81f8e0161741da515d53cf6f16f2135803ba03be3a6530b8b32b56a3e1313f9f3f982dd", 0xb0}, {&(0x7f0000000340)="5ad0b45cbab6135b991be87c4b7a0a807a47f5b415b9da0951f973ecd56e9fb522ba397d0664a6492f3e3aafe419b3bd4f8dd114879dd53f6c5a7edb2d2b4249b22309005593dc400f", 0x49}, {&(0x7f00000003c0)="79cef3ecef23f1479ed2ed683a3494dd51e3de1bc93f151a16e6f6c622a6e41c8d6664b18bac0aa692c865ab8e8b5d6285a0230fdb8b4689957688f6508e4aa137cf18bbb6ef77f0236d94e22f3e35dab39aa9ed92b1f45d5eadb5c1d778d1ff3f1498195959a9aece39872735f6c1d3f155c1213c9ff5534b0d8a150bdd402e13d7cb14316ab1b0213ea093bd9477c640", 0x91}, {&(0x7f0000000480)="e17f8c179cc1f9216568e0d510e87e6120c7af96cd6feee53717f5b15b27717a833fc8cf8d38d73c40603d87202f5ec9a8de7fe44b3c9ad9c4531185d5252c2436cd31d528fad9332eabf8d2e2d2115235cf382d4e32d793d3074c00bf137a9c7a2674514eabff621d9299613b8ef4ef6a6226cc891ef5c539e5c339b414716324e852d52fdc5b", 0x87}, {&(0x7f0000000540)="2d32bca08215fa70b407731f601f3679e823aafaac81046d463b634f970a9166fcad6b022def4daa73ee29f9d73bb3a38a94c7af9ce823fe5571b6440517c7f1a9e55b79a48e7b63a9b895df2ad8b6fa309fc6e535061b4a1365d1ccb379c4ff80b4e03b40e714294c424a400a8ee3473c6e05e487b69c6dd774", 0x7a}, {&(0x7f00000005c0)="a0b660b0ea8239384297a37e430cc07cecba72f0cb2976b11749514612b7965cc244ab9fd7348c7a13325140545365c04786cdf67b514eeb7ccd7f6407adf7b00040fdb212b191fdd0921953db8cbace5a0b4e3afa3456efb6680a0b2f1ebd540d130ea888e466678528acdbdf8f61bef9551715778112d84fc01ebee0839d7a8ee122610fb4be94ecab199c678f0ae5aca6956603a05b55a4cf34eeba6c1a68905d7028cd3c5db7fb0fd682cdd8398f0365104129d9ad4be01257aac981063ae6a518350463ba9c8b0c1546f344a4ad404c5ccefbc83a956ecd917dc09e8ba64c7e9b16be062b97c0b226f0", 0xec}], 0x6, &(0x7f0000000740)=[{0x70, 0x10b, 0x81, "b2e1b9d2365b1d2de8743d1da03da5145dfae15f3e1bdeec3b64842b26cbf48c01ddf0c18253648c7130dfc18f0a71f300144b3fbe91b9057e912cf5adb7b227a58c61dd7acc25c6fb09531c631de67e2f86464d8b6e95b8c4f3"}, {0x1010, 0x111, 0x2, "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"}, {0x1010, 0x4, 0x8, "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"}], 0x2090}}, {{&(0x7f0000002800)=@caif, 0x80, &(0x7f0000003980)=[{&(0x7f0000002880)="ce343ed519ac63b06b3feeb98a4e3e51ec739caa67e263e68b718f2facdc27831ff9e1c74689bcb52f208947b1229c529a4ede1f6bdb0e383488e99efb1027f9df3379b74a51fd5505035558873f8e69e457387fb700a182a7c79fb5ad1fbd244ecc9de2e8ffe3b65318136045dc4b79793032bec2b520b8b2e7e567202b841aa1597f31c9464baaf7995d3383ea6fabb474c88fb74a2abeab7449df965855139af3449a7fbdbb1fe33490897f1133b77a8bf2fadae1e03e5b73ba16a3633a33c7aefbd8af052c2801a5178f75a601531b41337f65dcceebb7b1ff6fdd1c234f996fd9a285d1b46b8dedb4f64ced20a70ac721b432aefd395d67770f995bce9c115059846e600609dcf3bf6e8f11d1bccd0259c5a90af3ded3c4cdfeac8d5674af2faf10d6039ec28216e08a30828a7a63cd58b5d877e3b2a75cd1240e8bf14f8e6077046eb8d8a220365b09a7d72b594ff7f1070a26d4be9851cf9fe8acf6cac1daaef0aaa1af5410b8714be04f233944bff00a242f6ea8b94de7beb8ad44da20798177df6c2f3d2ea199df79bb9619b868537a680039867b659e0dbd269c46fe8969a0815d6cea819571551a97ac3162a3d0053fbac4826712f61f9859d6665305304109ab073fbca6a35a9ecfa9798420ee0758cd9307fe02341b15e363e9b2625fcb8e60d5ccb573dd0fdfe21e360f4fbfe196ba8f2ccd6e3b65e775d54cf5379c0af25e604f613bdbc619226d09e4208cae8dd4b77f18592b78a3335c8fefa70a2795a524cb436ff3c0d8076740068eada39459b27f7e3887e6b2d1864686ac63c1a16714e1afe921795fe5d9bba64e21c07e3e317beabd64c81d4e1af98e8dcd0bb46dd73ffd860b5aee27fde23e5e8516d30d883bc69fe71d2707d3433226873794e0e59ec8429598e15400de29fe98ec53eda564c5173f94efa1b4764c31209ecc66553f89d1bd264c4c8f809e370921a023df13b1204b1f74d8bcfafd0085b9052371189a7b723cfce3d2509686c3f2f72a63b926a10ec48622ea4bd30451b74ea4788ba05c35b705848e185e7af21616b91e8140fe53746734f5b92953e93f9e51d973615ef8ba761b2d50d7e83276ebd39dbcc31b517e29545535b7e0f93cb4b9fcb82430e9a01fa48777d023276f036390db7c43ded1ddfb5601b0e031327548c43f6c332ed4d4d279900ea86095709fa1714927f8bad42d81ea0c00d2902185480e6fa92bf4daee0be8fce8537716a74baa03cb85b7e7449bac12ed6e5b1a72cf0a52a62918a0b28136108adb60ae77928dfb9a67a324d2a48f3ea10306a52c8fc59a2021e76c1bfb036d3e392ac4a024ee905971a6d24316515a4d27b3c25078f0cc226c2b6e981101baee0ba9e874cb2b6582392aea40bef2c917fda25f2767915bc080877f1d3ba2b3277ebab7872af4f03e69f3dda1cb8ca2c81a747483a3a016b2536d0c1466585cf95929fa63d44185587e90144d81805508293c21f21259626676ef4dd3ced955a6e7510948c0fbbb584bff84828d39da30efb5cfd92f464f5a52bdb3fc32655070c1c8ed057592aea7981649aa1e6ec8aab253f3d1ee02ac24ed12dd4236660a98af6064d90461689a22cf28367efb900610e81c3b738f1af78c5ebf4f85a23bbf9103b4ccf14e42da8ddcea26f908e2734b7dc8c35842761c14c688fd8e4add60618145d6a77982ffe93e36871489913b49ed979cdf22759bb35fcdd02554b0df63fbc14a8c3e8fb440933242db432742259f89ce12946dfa1b1b7feb1fe8f162045090048b2da99b557028349388d4d3c54a200dc6b4c5ae65b63f6d2269c3abe9bb97549755c061d2c845c90f6358e1b25e4c6c7b6ebcf8957a74e79e180719fa206685ac39fa712bfc12381ea1dea75d35f582d36157f0105084139becb4cc46056fee5a7044a2cfbaf2a9b55bb939af601ac778d7f0a7620f3177fbf657fb209e26908db11efea317673277ed4603d4631961912992513b4173afad4e1eb775144cad17efd2f8c9695a155035826df2074b790c5d8271af62af63b607b04308bc1c6934a1696fd7e8f40ae79a4ab0f183078ee51723aef3c42d41701072e5b26095e347e3eefa539aa3697c37421f3b7e6d9154dfe5b9cce146b478ebcd03a2d4161c5b0d2fd59d3fed237a5e89f469a97d20ca264eca83c28b233801c70dfe8aea45fb560d365437f956bf7db6eb5fab0c0f4463782d8d416156caca52638b9bd31797e0f1f6237fbb32da683005bc5a47ce1608f97bf8aa194edad1c95c6115bd2076c4a0c1e4eef2509f3db4cf40bb89128e7123980fdbcf580111541262aac3ee08fd2f6e38765db2f851fe8037429038eaf01894eef1ea350ccd932e55deabda5c4d81dd51bfc401e9887f0d6c45ed7cf3664a25b57d658c7ba0a54436df0cc10bbb051a87f90dced27fb26396fc8e0b6ce1c65782b42a2a70f132f911565c0cf04db1467d1bfaab3c001682cecf9b087361db7a5912ea280bb8f7d422ef4b5ee097ba7296b6073fbc5b5f19806b976f5ed22a439c263c7c6d58beeb76ae80249a4c253809b94aa0adca3c10fa9526ca6870f2c09522071faa6f5c1ae620f6994ed417b9c0bf833c9af10c78031569e6ac05da0c11a26bda1acbca34564d5fd3fcc0a34fec21dfacd7afa58ea7822283d43c730578235b14ba63e89e8bd70f20684fd3f56155a5debc5af30771ae163e5dc5f5c5e8ac5dfbcbff6bf9a19ec73d71e5614390002908d7ea74f1644b607f3cb33e922ed5d35fed9d54c513db3348ed380819e0a8261ae735da55a450a68598fc62682ab87008c4297ad201bc8c1bbd8ae0696ee9e7a218b7f5075c2bb7ee35829eed88f0caa8fa5bb78c961a7cb2f84559a4e3b3283a5e8e26e9db6e6958bb620869d5451abe476c9f68d69dd4cc10c841012c90312417b709b06f7d3d653cbdfa19fc36fbbab01fb0ef7190796dae566b455b398b8457ed8e989953b24b79338de49a0773fb2867f5af4c1931c5f3dcdb784cffc5e539a4bf33ded36d29fa4a8b2711774517ae9ebca31892c81edae272c73d71791b91704f474997e75484e07c6037c2ab6fa90ebe7ea344c6ae1e4ebc1945a4df3763fb042753e96cde456b605aeeaa4e04daa047d607216bd643dc7422802025729da26c95819deec2ba10d118f5af00282c3c483c00673faf82c76a9ade876b6859c3aab21592f5770bd51fce5b581ff36face64ae50806133bb75ff0ad4cf2b430796924d184967019426b0f21493fa3db04d25cc8e82f7413c17d9062e213ed3df9cf356464a941aed71fc4b656bba1154ab11a06cb8a2db2ed047734f7e138bac7a17ebe0c98ecce89d0c4584562963d4fc1b187e4b192e333a6249ba14630568881761ae48890971e20779f887c333df89036e25ef70775208394e05b17f3e2eaafb7393f5d308ecca208e94591248aee8b3668403135289c9a3d20baff4661b586c1940c2b73b3f95bcebbb07ffa032e305a75b3bd699ee9ba4c7cce5725b37f2eee592aa54012b7e2ec45dc35dfd68540f86d91be57128d06326d9a8ebc832043b9eb17a69c75788c53463c823668c4bc4b50dcd0675c6d19afce8461f6dee49e4a95458742c77a498dc580ace051853f7c0005cc83a9215c4cb7486327d9b55a77ac6f6dc7707529a748d3ebd716b8ccd1f2f17f66cb8e418ead9df9d4590b510e45bdbac0af51da8c68ff9fdb93725338993bbf9032282eb4778080c02563389d1ff03d6df4ec9d7b69b5608e9cf5f05714efb09958d9204c08d0ac93eb46a8ffb41fc433c570397fcadc16c81392da2047b2ac0b87fa12fe4274cae912198725891a8baa69b680344494b527ad5665d3dbc6d21f4f8f71a7cd8195b89ec3620e2de2dcb7b42910ccc4c1e605c47022478121487f22857e1f5ebff7c75026cd8a8f54e542388fee3df4190a38ca419ee6feb2c5c5eb3191d2f72674e6316cec1035bdba15d3bdc708591d893c9625bba56c011ccb1e3c9cc9aeebf34a82be1ac019efc786947a3a52fcb770906321f25adfeb1ff08fdb0f082eb43b459ac06ae164e8688b3cea5c9ce7cd9069813f5536164bd0f6770e4188d95bb3cf54fc9725bc2facd8d39e374ffdb7245bc5f7bf01854e65502f717c005e7ca29d886c2b54bbbd305f71789dd6a3c472c2dd9c61aecb3e4c7721c9e86d77ac14d090b510992de09f7b9557be6b43a40b0738d3ca0e0a3bac6ede0fda1bd68bc40caf2fcc7fb76356693d6f07112f49b4d3b02ef9446d25e952d737bdf128dcb4c8f073285b87de51d74cc58e6865f0e482b6dc5c35cac18a0eded2cc0ef7f35f6bed510333f3292679be46004d827620781461c661c3f22759ff8d0a43d6b0433dbbc51414cf11412f820129e2a6e4cbc9cfc3b68751d846d9149aada8ed8b74f3b0a7dbde72858894681c2e5645b1eaa309570cbbbe344fc5f9569a2a2148c36e4e1f89ea7c9d8d9870c19c0708863b05549479972a89b355fa30ebee9861defd101f6e6c70f215d6c55819c5d34954b956543e1e453b24fcedb2064b739c98cbcd2eaaa76b85fefcc8fc56516d1687a743e3edaad5ec71d2a3c30c36ebc465306b7170e9ff47a8a15b7c8b44d1361a6102a086e06e68fdaf435dbc0fe1dcdda01a582dad643159afc310b788cd3ea5c85bca93700e33ead8d15fc4d1dd2fdaf69b3d01e550566cf3c55f0611a3ad1b0dc25224def9c648750930edcdce182fbe3b7670f444a0aadb82105acf05bcb607adde0d9636189064b5012088a19dac1cf09d4d46db371a7e6802d8a1c2f7c33f354f8ed990374a73c6faee267cba981b10f6684279784a2282c15ef448aa845a9409c5f6ec9868acd40c8b4bf3fbd0bec46e549386f10f48d03482e7a609f1421e027a4d5890e3a4b1d56148790f8eef7ac136a206aec760e7494fee180405190b2265c0f23c7c760a0a8430ad20e6dca4da09a9da81c44471db1209ee101f2a282b72f6386597d813d77ce9c074d4a2ce2ef4429e9fc76e28e0345fd3539fba3c7b06f8ebb1a97a79ac7e2e34e10f357d6c64c050aeaf7f3090ca0875e83713c9664c0b21fcc54a02a07bdd9d68bacb3c8fd2dc42503086e510411d1783ecdfed34bbdd192ef38213400182abba84a67ad63a947488efdd2a44698678851f62f94cd218076646f9503511d0952163b09038828203b6b108b9c648709d9d32ac7dd7582b34a0d149b08c0535a58be84020a91e95072dc8ebaefdef312fbec5a0827af6a66bcdcb24e37ddd6f721bfca1eaf9e0ecd3e0254cc0e02ca7fa63b39846867cf4d75673c1b781747036db735339940de15e80d4ed37a7128cb7e9253a711d7233328ed7bf755ccaab6acd0d2f4a9797e3e94d3b5c302c9c4f33152d2bf60c4c3a7ec29bb5202f2ba7fb6c1f6ce9e722727eeaad7177d0fdeb45bc8952196a1639adc18152423cc6b5ccdb19a2843a504c52ca9e20c78ee44c13b7c9bc6bc37041443fff73e4a21f22faf42306371be11f0f73ddb692cac8cec15082e0700e4649c85f61c03cee1546b5537bbba0fa32226f74590c595747b57db12f2503b5177b484c2cbb38a7941688cc5b6d23edcb9cccdf7b54590b5b0af15b93951e2d3f54ad98927deccf8590cfdbdbb53dd0c1d1de854b3426bb1f9f67355a32f078d371241d53eb46ae07a961927fc38eaec8f56d2179f5821676bc1bbb36085dfe8afa79c72da9fac3f2058888a7eaa9c6b0f92542d6a7f4f74470b45b0f2c32c4e4ef73ccf2ed329275155fc104a7ec2d", 0x1000}, {&(0x7f0000003880)="462382fe701d43ac01862a8f4ea815aefb60b87cfc00aa0c2b992d2d2214f0ba7106f32d5546b4c6eb0641cef63088b2e9a2b1f84377a5c0e85a98eb60060ee00cae27531801f37699af60823e13cdd1b8ee566311f9fdb0d086ff4cd4cf97f877de915006f68a2fec664522ed06531f35be5cadd434e41d387c6cb4d69159cb78d312cb7ac5ac9a74ac49a1dfcbe5cac0618e945b8d07c576010e6c59c2b4dd9c75bcc15555fe16ef3ed40110e8c938257f9b69388bb5c1cae6eb6b73fad728d6260db28f1fa446933ffd9ae7dafd963f6b2a82874b1b4803fc56b17b94922742b2dba6e9f421c4", 0xe8}, {&(0x7f00000000c0)="649f6c1bc6f066b925d167b68bb0fdf92613b1b8d09818b3ce5f396f79125a4b2e682186aa5b07da0473", 0x2a}, {&(0x7f0000000140)="1f54bfbf9d2f079683e8975f8e89b89332660a4ba055467e91317c50f700b0", 0x1f}], 0x4, &(0x7f00000039c0)=[{0xf0, 0x103, 0x9, "9493aabaee1351a4379a84d17cc1cf577fbffd6096059847a5b092b77e2a652660fd3eba3a239f6a620d7c5979ca21ce17bcc266498fea807339591dbe5685ea9221489ce7f5e82f2517d599cbebb7b4ea9cbfa1bd7be36483ffda58a876f4595d2a4e584756721cb2a28a133e5db1aad69c0a5191aadfcf3433583d9131d8f3b0ed0966f0efeaa082ef422355915fb547a6a871a20163eb6683a7dc1193c535dd923c77dc991b83f0d0412ab9c09faa2c79c3fd9f0266fa26714ba111248d754471ceebe6e3ee72f984d5d623845f62d5089b02f8d5e9faf65e8ea72451"}, {0xa8, 0x10e, 0x1ff, "a9cec32ce25a519311403b1c0fd0fb997b89543925739468b40c91ff4d15bd564de6c9db796553aaf26cbf95ff7e548b82caf4febf3f74c36cfee6c095e6f0bb5f8d1736a662270b0969536850c27e52c8ed606df77614cb82ad6c8b5ee1b1fbeb43c0704ec96237e131f77fe0483633f8e148f33fcfb6de1358501efe227850d09346ffd905535bdb1fde47a246eb499a01f2d0adb7a0"}, {0x1010, 0x10d, 0x200, "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"}, {0x1010, 0x10d, 0xffffffff, "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"}, {0x1010, 0x101, 0x3, "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"}, {0x18, 0x10b, 0x2, "e3"}, {0xd0, 0x10c, 0x9, "cd1a2b6cba44e864abcaa1863713c89a969f79e9f9b90ab359ba874c47663ee83a8131613d0ac90d1b29e4249ae5cdbbc362f1a1d39aeee776f467793d3433b4e0c26e306f023006770a1ff460bf502df8cd6ebdf4c4282ea613d8d29b262a054610e685b40b934e968c227e7a6ead6f24f28978c07c51e750d56d460bcdba9c7a23a1d842ffc24ff15597de3ded2047ba4397da5597a09ee924f0f5579408ce123583de6866b6cb38a029a96e66369d44a58f8f0df272fb7e82c27b8ddb1c"}], 0x32b0}}, {{0x0, 0x0, &(0x7f0000006d40)=[{&(0x7f0000006c80)="647b0e91f8ab357f19642e61414b544f5425c8596498eafb23aac48b8f0645435ac6a4f7c5de4f5fa6fbb3519643ac4126328aaebc60cdf98ea5190683274ea007efd0516575da6681cb338774cfc542af8b1d3c69ce3943aeb4c3068c248c7a6f0248bceda4efce6b69bf222de5c63bebfba9a1c489c3eb08a92f3d457f3fadee", 0x81}], 0x1, &(0x7f0000006d80)=[{0xb8, 0x10a, 0x4, "bf115e23f13d50211775e130c5fa7b00c8091e7e82458e47b67f961569768a051be7c3fcefb579f3b462acdfe7cdd66084cebf159f532df0db5eedc8feb5dd72744f07ebe976e77a4dd00ce1089d2beda2df6641c72febf139cbabe198030dfde605add727134d70c0ce2b6fa878cbbdb0358fbbeb4a46214af584a1c986826ed0b8c3b04a1fbd0aeff461ba9b9ded76f663695c028ffe56dded90c2ff5a038558ca11a1b5a55e"}, {0x50, 0x88, 0x67, "15a64398291fbf2b02fe9af01844238a49de7c37a6627825c56f5361a84d8d17730dc772f4da368b9125b0e3206fbc4d4b5f67215bac157a9cbf0f6e308f91"}, {0x50, 0x102, 0x5000000, "70cd338234d3ff119a6104fac3cebbdfd6592b3d7bc6657365f98213d2d83dcddb8e1dbd7e50eba7ec4226b0d01819999d8d993068a34abe7734"}, {0xa8, 0x109, 0x3, "a1a9c1230ee2767f0d63f395dbda0d2139dad50be8e2670895e8da07be8d60f5b127a8ea93b1f299fb6db436cbea2e7c9b949a02447e2d87760bc1b78c2c18b0211bed275ab1d07b13a2a0b69c47dc14a974de35c7cb8e040846277ff3ae72f65ed434dee2edbf81dcd955ce0716c0733fdce70d928e02633a93280514b6fbdbfd5b95a88299a99f99dad7276d267bdd5327"}], 0x200}}, {{&(0x7f0000006f80)=@rc={0x1f, @any, 0x3f}, 0x80, &(0x7f00000073c0)=[{&(0x7f0000007000)="b5b62963c982f242254670bb52102eee55531a72b5c4580544a691cf9a", 0x1d}, {&(0x7f0000007040)="e0d983488812916d1d0c14d74effb5bb48cfd6dd118f18ff3789181a07e00182538a00e068845c8ec5e1bca9fa867da17dd06e272e225a72dca35c8895435fa6e8cafd2523dc1792a7d065cba1177787d768e3204099704ab314ad51bc3de73456d5d3f200e58bda7622", 0x6a}, {&(0x7f00000070c0)="755f27b2ad067a74ef89b0e6a7ea2e970e64686afb87133d4226ca38b193eb1ae0afd7", 0x23}, {&(0x7f0000007100)="aab8bb6489891a046d53be1d469fccd7a732cfcb373219b9be59548e62e232c4e89b96a8f027c68ed6422f1cb8a8a4bec81dbd4e84da4950093b9ca483dd04793b5d59e9b898e11661873579f11427961960ffb56fcbc93e4a80c1e0ab213a0ff3746b3897a1cda0ae5deb52abf1d7630bb1ca6a9b9e6dc550fa9d03a65af81ea7d2d1f10ea4c46f8dfd146f091df01c64f4849de0722c644ea599", 0x9b}, {&(0x7f00000071c0)="73f9bd2eb4e4c4b0218ed22497458d0fae5ffff584aa9f35b2afbb7bf9a011db904b20e63f95aecd179e994dd6eb769871cae71b03682c2a8a6ed88f38044ca8bbcf5606d3bdc8a752b0dbfba2c54ace9ff02d2b4407a34a8434845effb1af27e230a6d0e4cd", 0x66}, {&(0x7f0000007240)="dea47dbc8a70fa08411129c51e581f64f5128e8d98f35188ae3eafc7b8a63ff0a61ab40a7b374d76e3b78296045d27f2b0bd53ddc4b7baec23eb4f94c90f3c677668ba5db791aa38b549b670fb8a6f3428f37630aa5826dcf3241d6945ddefbe77b140df9614890328ce7551448e66a8e460229dc73ab98365656eec5e92a1b224c12bf7f8994fdd92c7466bacc83511eaeb6b513b20a9d3e7bf18d4511040ce1c632ff6b6bb688fd6c34020f70a0a21dce0e353859be02a2115c34d8aee46c6814ac0886380ea5fd8d33377adb2bbe2efed98039233456f4edb773303a0b6", 0xdf}, {&(0x7f0000007340)="b990bb57d7a89c38db636183a964fbaa627943421b3dc61e4f85b7e346a70dcac7bea6997924085482e877748beaaa80bcf54361d9de2881ab9a10d26dcdb6b24f75c2eec9257baf243aa22ec8fe2ec98f13322ee453f157a60c47eb04112048ccb8462fb24200602d755e02c1d05290496934b1f145", 0x76}], 0x7, &(0x7f0000007440)=[{0x88, 0x100, 0x7, "4a24fd8326f4e9a077f6a97dd105ce4179464eecc3651e426c54f47f268f3e5670de774b8323bd7039dbf1bc605dd07bd69dc818ef20302344a94c737221e44250483fed48bece431cd97f189c240fa1d8f677834b2e78b798d7aacf3acb35fe76724335d2e02ee9285c0c177ce7c32ebd790806aaa525"}, {0x78, 0x116, 0x0, "d34360151375cc1b924a0fbf4221cad066caedbf2711a437362041a70653f17b3cbca3f925ed96f66389c467cf8129c545ee931796448c2984f856a76cdbd2a3c6448513c73b5cdba645ea54c26aaa987c8182e2024a8179d9296c545e00cdd5801c"}, {0x90, 0x115, 0x8, "676d11e2e8d044fb2fe3e1a075d04dd3da2fb932570c33237319e99a862f0a4a86c9d3d23b33eeac8fe0689cc331db81058eef2a056f5a697b695e05b2d30454f5115d01629b17eccdada0525a76bd1561250e5311cf601cba9378d240e9a3cb3d682d3c640bb103ab32db5130597bbb242adc1f46f89d73061e41bc0bf1"}, {0x1010, 0x108, 0x7fcc, "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"}], 0x11a0}}, {{&(0x7f0000008600)=@rc={0x1f, @none, 0x8}, 0x80, &(0x7f0000008700)=[{&(0x7f0000008680)="e173aab3af2819b216b01a8ed8db67baa059da90162676e5eccade968ac94afbaff27d85fb9eb77c1b6876538c19e57b4fef4be8b2029fa09e79c49e854128d524", 0x41}], 0x1, &(0x7f0000008740)=[{0xb0, 0xff, 0x6, "d1617d417b7e7f405483fab1ceb0348c2c37f4160a4e492b6dcf270ee445e1f1a5b0c81aeaa172c3caeea768f99024bd622327a8ab7a4cc054733695c47537369b5f76f7240ccd1a8fed7c22a9c6a44332ad1a5537acb7b6ac20d7278c8f25e0800bc950f2258048a5166d75969ad98fa5888f42be696f5c7a7da6eba5af7ed9377442d9d49873afd190f96e55cfbe5eb24c1c20b410482357c5df609b59d0"}], 0xb0}}, {{0x0, 0x0, &(0x7f0000008ac0)=[{&(0x7f0000008800)="b979cf796ee993066e9d8561e9ab6703db35035904e1fb57de823ba3ee746a49882f722d42a0613c27ca60fe4713a7e4acf4f8cbb7ecaa2721bfbd320461046e1fc14c4366930cb51b90d49907e40b6d3677b0241669ec044142510f98223ae7d6d39b02a0db52e4ba42449f7c2d0dda7b0aaa938bf2ea307286f50a4da3d3136e5fe324430fce780bf0f74360", 0x8d}, {&(0x7f00000088c0)="68051921cd5c1c0567ed2cfdfc78d6f4b65173977e70df5a0aaccdcd6865fafb8bc50d2779579a1b2620ab16539f6d9a16b0eb2187825d224111e5aa81e1e4ed683fbf0d15ab57a699f4eb4415cf6a9099e3609e439ef5dd9e5e62d8b7", 0x5d}, {&(0x7f0000008940)="5400340d9c056290a366d63be640acb59b81204502be8f26e4f1a20d95", 0x1d}, {&(0x7f0000008980)="c5958faf3af997c1b49ae02fb8bd41801873d742186ac82f2911dfe07f75208d78bd76e5b84ec7ef74ffbe4f11c0f2d02c2184f3abed7b307b1163d363e9dca91f82b9b5e990875dadc59b3ea82b7d17c3081ac0618c389fd0971092f10ccdee97ffed4e1851f5e1bd95aafe40d6089df1a180908056d180bb3b", 0x7a}, {&(0x7f0000008a00)="4021580f0c175f3fab86220525d672934fe0e1106ba5babf4720ba8ba8150122dc11135ce87888182dc53e96aa7d2e4aa9e1787bcb1a90212b254a50b24ce30b6aa9bbe4411ebb489667a20433b795729ccc86602b09adb47ea4e8cb56560f6cbe7ae5dd5937d3d5d9636a14d5fac14faef8a6ea6e8f2189bfae2934e79983563c78586c522e401c2a4a1e4cc472add7e614d4fb0d3aa61db090329b444069bffa7baaef75ed55e9030f78ae02495323584ab901288e06df27a4", 0xba}], 0x5}}, {{&(0x7f0000008b40)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x80, &(0x7f0000008d00)=[{&(0x7f0000008bc0)="49d30c89d5008c89477d42779622eefc279e7c97f6fa332684ea102e584dc7611ea15de417220c3bfe065c55561d092c2fee7a8e1dab1d94f212e7bbb592e96c377d2a7ef340786dd553beae401a5b507df34c61a1b3dabfdd569ebd1758c190bb23ac4b62fcdcb8ae245dc3e8e6f8ea19646a127f80da4afa", 0x79}, {&(0x7f0000008c40)="5c82265fa5820c5c97d045bd9a86de7e171bc76561ca170e7392fc76182a6bfa358c794cd709d1840cd6f754538742b2313650f1b544b4336e17e1a3622749aa836cf795097924dad44adffded23c4d68f095873b5c3794d8b30316ef48fbbd37d13ba1a50527456292786895538298b158d501430f4dfe1aed610db0027bd759eb93535", 0x84}], 0x2, &(0x7f0000008d40)=[{0x50, 0x101, 0x26, "957c0762336dc7a3991f692cbc3c2bb29e3721363e4b91db63df422b9047cc240a7a896a8d0d2801ecbb7427e9ce1393efe47eb56a021c696d"}, {0x18, 0x88, 0xc4a7, "a34bd0bf30"}, {0x20, 0x116, 0x8, "664e186709d4b5811f7381f2485b4c"}], 0x88}}, {{&(0x7f0000008e00)=@ipx={0x4, 0x80, 0x2, "cf152ad98ad1", 0x61}, 0x80, &(0x7f000000a080)=[{&(0x7f0000008e80)="a23777dba7378d243227a50d51391499686f09680b4d0aa131330c1e2a8b0fb4ecf9773099550f19afd909e309f2c918950fee0c08c2264f8688b7359f6e2a8797c30957cc7fbbd02713bc4b2a1c51bee8c6e1905c4234a91d68cfcef65d21807d96f514b20f686fc423e90a5749f583d1d22aaf1f64600d4956bfebb96beb2f960865d4c4705363b279b2a652807f31395170057e00b8496658bbe7b269d98fd14422dabdd680bcba7af47e98e23c1071550f13bee0eaf6a299ce0b224c18d5ce74d9d72607d0385061b024aece5b858eeac9", 0xd3}, {&(0x7f0000008f80)="8abcc0fbb0b5a571a4428dd30277372d0348819222502c726e28350b7506104969651403347df877f7eda91ceb728c19875f6a3b340a7a47cd9041788b3589e851e974b01af16ff2ecee5846c6a82522a6cb31ed57b9698d87ec6d9a1ed4f3813c0704c83e74f58873a463906c469065444daf2c0bc391363f7044314ae7d5e49b823689ded35a9eae4e3500f14d8a91ceaef5f472a052033418d5d11d38c7e446b86079689d3dc661d72733fa745aa3d058a353d0e3c58eb5cb2d842c29ab5379abd6683c2c", 0xc6}, {&(0x7f0000009080)="b0a02de02cd9fb147363b6aa303ddb906018277d4c65d263d0d0eb6ed35f47b94deb717dcd895d9a202ccea410c36b499de366c0f1bf368b09cecc6913571c96fe1fad54f5cf73f23c5af71de6f3f1027fa56c152e077ff92852fb1b8ddd3a9b7015f17f9defdf5dfc54f981eae8fb94615b4fcff02a75f09f3d83602d65744c70db1237bb9d57ac25faadbe959a7e593b06bf4f9a5ea642194c2435b2058687945b175511204f69104d083298c1c59e9d7eed61d13b066348048f285f51a90ae1a8bb0df21e6308ceaadc972f0d6e3817bd3f68fc9a943200e202139d2b62b720124c01b68ed6fef5926a5d719007def6e7153f023680f357e05a896f52f0154c8e36dbf8a96724a1bf93b36748459c997681bd3c6e0da431db3385a18d5e5c0ef60e3c2f5bcd4128f3b9f5c61d55cb8a1f15219d31ea6be477ecb95e7cae9ae0a6493b856212993e838173bb93d64ecf4f8fb2d2f688bc599516decf4fcd80d4c4c747d304873cb4a2467ab46f1a4a0cc625043e7ddad5ff962305a43600d062d63426f5f7faad4000eea70ffcc0f9db5ba5256e8228146c20aa6364073ec0e70e093787c861efc3ac6f74622574aebda0d11e665a89b47d1382862b10b9b347ba6a5feeeac366ce833899a3a71e3a4b5933f196db704c7d7ec5cd0622fa5d905d84e78e1e416064ed39bb7d2ab34f25bb3121f538cadd02bdd0df52fa03ab4186535bd0687bcda283ec1e1aa691615a7ed91eb1dd44ea5b2a9d670e06f794d19a68ce48cd3dbc9a264ed3d8a4c27731df13460313a186a2a25b57328c7e2df2bd19897b4001420e3747d07eed327ac864d272e7d9dcbe70a6c0ad67984586eefd30bc8ccd0bfb201040461cabe02d99fc4114aca667570c9f111ad9fb2867357d44f28e9b17fb02ce3b34c810809eb4c99726e62c83047c0d6901ff2c92bf1988af9af5e275656e643d9157550abe655424373e06c18941bfc7fc529cc0e5c4ae1f6e0d45b7860977956c6e26a41a0e96895a8963db62a451e466ff17f38f155d91ef8fee8795462a3d5a68847c356450ad1f4634605bac8822ecc103b248aa3d11424244a1db2b0af069a11898a12a2fe82497d7cbc3d131ac4b6fc4b07309168bcb3c15e6129437c1cd747d3e0f5111036469dd003d9e9d3aecfe3b5ce28a7ee1cad4d91197180dffcde7396b751408fd1cbffb33582369c1b6226f037f08fe40cb1b4efd7d7d035a28f6ad35dffd70bb6c2b99723dd75395e1d47a07ee24a73871707ae8904bc694d8372fc6b3874b9fe1247807fc72ee8799b077aa6044fd051c88f8c6c188fd812495d57a620fa93b81917d9ecefa84430de124d6df832d9bf83cc642762c88397b6b6ce7ccabeab35eece81bb71c2c7c3aa36ef607f143bd7f5284111c6293f9f463bf11cfeabb820071b802f4b5f18da262a74463446d8734e7a72424071cfd841136b270e87c5b779ccbf91feead911b795acbe05b948fd70f5a3e9a460acb4ff28efefbcd3d0722a6ac6164915904c8ef6edacf6dd6f99183aa3d652ad759b716b28a829ebb9fd6029fb71455e8ed52c8eae5adfc6863ce853ac9d6dc0f87dc5cb4d05dfde21cf2a9603959a81b6a692eee41067a653e033a68550c6326266e8696f238cd38ed3c8511008b32a71ec764b65cb971a1d41a2225bb1534babe0687e2f172c4166fedf565b7366848abe9bddb5c685f3f65c74f9c78bfde3acb5fb8c15270dbc442479ea41e4f153da3127794d31c4aefdc42fa04e41d855760454a230caad08869a3abd5898d2acc95f820f67f2a589a5577e2e71d7158f383e4f86c66aab769a5c63ba93166e3cf184f21d21b761f08ea69bc54520296841aff421e75da76e5ef193aebbde3ec2b71ca66e61d14595f2c97112e42a88ecfb46d4c6ca33f201af53fc6e405eaee4dc41abac9fa35bfaffde11ba47ae21f45518e6a618c0fdce58dfaa650fe9b07885bf7a00d27d97389ad59079073cd906ae8dfe66dfd93187dcaa8e03ba6f4aa9e1225a9e3787cb6ae02c21597a9189932750501d02c71c16ebe9416567ede7ef570e1758a61fa7104e28a3cf3e2353ac271a196f2ba59d91aab9161c1d95013741c9fd9bfaf76171436b2c187346916aa15db413e475a68e9d101ba0100560c0df111bcf58451a7d6a5f19c7197128babf02acd9b598ed3941be7f581b518f69c006509ce4be9d85261e28d7e1f5def1d4b84bb089fc760d266d651d70c6e2e13bebe6e3926661d3365419d4c072076e51fd58a77b508d0dc5f9e4f1322f79a1c71161591cfe8aca84fdde7ea080d06ebd2d5506c39e3b11a269aad14c3698fb061cbe83641e8a46bbc9d55e4eb45a6d2d74d859f09f5177bac530668f404279532d84dc13c6a69110e4d521da1d0cb035528d83365163756850562ccabfe0086843df0e77d28d9243d43cfdf2c5bee05d1cd9546e85fdc8ef78bea754c8b51a52b9f8fd8f934bf171ee6f9b7ce3d763ae2a335cbf87dae0550bbc4c212671134717a929ef7b8fc3c04f32775163411cb1378f3ad68486817c39b5753a8ff5b3695ad062a04b9cd395c6b836d419453c1fbb8275b3e27ad1b9a0086abce349b9230c2188e25eab73d1461db36f592c58f5809e17be3f6ef86d7111727da32ec0bdd40cc09a10ea2265342856c857beb1e0169837b3c8751526e8a861950ecdc1e3af4a86be358eb9c83e3eeff165aeeaaafa4e95d10b7ce9384f78812c7d770189d3e34a3b462544312bd82481082d4dc027f44f1005c845f51d43158078f1e8f1d10f2d36824c63438a1a9dcafca445115ee9e7cf65a0d671fe394ce7b33e449fd72dbbd1f5ce989e7fe1b5e43ddf53984120c8c6b11b289bffe229fab78db88608c86ae47af2cb1c866526ddaab99863a734abe0fb827bad11a49a554952981ac890355a8d94d4aa2ff8f3989e3c2ccd82ba0c184ddd379cabd2d5dbe54086f60d578d7d1563ce3cd5c87ba15e4dfb16d720060e98dd4883ecf62db8c019fb7a014fe66cc8bcd94787383af3965dedc36abdb259775a2be0d48c43b857b17ec830a38cf6415d9b234fb09a5763f0a27a3f5fc4833432b5273d5bbfb6e456dac681ddd0fc42deb33d5224390323ebd90ed27b5eaac843eb4e261d1a440ab9f46f3171013daad04d33c38bf3a650d7af1656e7c2bb61a3fedcee5b56d463f7ba51cfe25df649ac6ca0475c87f132106bb978312e4b337d895dded660f626a722812d2d349f7d523c0d7121cc370777b30b138bfecc47f05b2b62a33fd6bda321dc32b5ac8e7e9dd65fda1fa7501429bfb4f42cfecb5846744d58d74dbc5da88ed6b680499f543f5f260c375fb9b348eea1395a07054805c8c9f911e9a212618502b0010f818e5cad87b654579109dccb22f94c266ae34a2902fcfc72caf959c738a3cd6dfde65aefe2991b606cfd83d12a5ab6577f6123074b2baa7d7da12d13ae9bb842132ea8140b34e0bb08d34d4c6b64a98c006b3b4c245ec4a1dc21f4a9bd1b93157f84faa92f768ce56202bc9a0af76924c9a2b00735ec3510f27422cb5e50eda5f84a2b6c3d0bde5ccc834e92a49065c3597322e4ac18d8890578439a3f9cb27c647077aea535f357792374774a756c4d4a67b357495096b24528e079941a30b28118bb33d536007e2c8af2c470c62a85122f550fd48916f75a9e58c986d2a00ef499e0e4f43f0ebb7b8bb140dff78f470aba8cdb5f18263217476bdee779943e820813124f3f1fff845baac53c376be1fb040a09bf3c50b9a0e391f793c33ea6a40fc7e458fbe09500f7161749f2afe5abdb2df78bc56ee745ad8489ee81d8237cd32f5fdd13a75bcbbb9c33fadea1c6eaf0672bf0f162998b22ceb75dab4b0654cd4482c35c89c8483a0fc8147addec8cc9a0db8dbbba453d237184caae845f66174dd356f6769c84e3269cfaae1560da3aff529988bb9541135e15248261620638366036d051ebbcf141427cbafb5d34b85bc5d4c25047622317d3a8cb76a9e82ab4f72ad5443d132cd7f6d08bdcfc2435078822308ce4d214355494631420debe8bf557211108297b0a1231b7f0eb3262134ec3ca9004e222be326dfd3c2ec46ce68a4c70d45d499f0a76e27368508672533e74e26ef6ad377d8707e1e3fa6088ea59d3ded3b0cdca9356fbb0b1f9fefa74153d2049ace2b975fcddca3c4f39eb2a43f3c31528aa9e9c35b34898ed7b729bf948ff0d497e3d40aee40bde2345479dfee25558f39367edf1b0a9d1b5f99ef6478fcfdf54b191f1486be1d8cbd2e7a99374992c1732c104abdf70f5f3c0891e990f0163e43da206c538b2f0388f825efa977a43c4688e6fb979ce1e71dd41845abefb823e1da19b0e6e1fc06ae22f618b3c61b7b24a1ebd12db11f0405c9821ead35ff646b135f82657be21d5365f913494008d596810b6e9f50a267d9401a3381e2faa26806d1539bee424656bba10c874c72219285699f8b7ca3a868687b43fead33329863a08ae811325f97941b6386485608b71a00bfe4d2266f629b598bee2ead63e5f26842a29abbfa693dfdf68444bdbc538a3fa45f46d1136f9c6b6795c1a053c70066d73af47871ae58e84eb2868ee81a518f27ce65ffdd9374f415d2b430ef9e7356f71c4ef4085b5b1834f437054d04bc7b94b3b1bc774a6f0df3558e38071c4c74ae32db7a462d6ffe8fbacb65d3f9fd9d60193ea79db28f6ae4ffbfa13cee73735bd64c4c4633f11d447b748c3ca681d69bf793bfc4d34930aef46f6a6f4e5cba387c15f716667aa7b78e159ec8b29d7d2e2d46d2f0c1035a23acd5f95ce7cb635db7c566c3ca5da61da18600b5717d1bf81e4aa41692dc77fe59ac50e843c402a42c43e7422a13b7edf053f1046465e30e92a6e1f5a2e70c9d868f16a32afb7049051515345b4a5baefdff3f30fa95938c5d22a96f208a71ea332e450cde7e6e66843208bd593d05102fa20774ecb7a8d5fe717a81d9d48bd09dd875f9bc912900a6eca4a5e6211a9252c0ef3dcc48a8c6b3276e93f7039d6b07f8d1d4799b1b48705675b016fc134c3087e1c2b0050fcfe2bb6951fd572e931eaa9ffcb6ce088ca0d721dcf22b6f590a554fda736d538f667467ace0235595417869d755c6955c5914207cf34ee268f88631de9b5ea678308b75341ff86338a7a553e2a2d30ad1ba5c495be8e6f3049a50113fe5cdc7fafa98ad8398e2a2520d59a9e1908b2d01d91a51523888f42ac47428758a2e9530564c47ec0bad326523f0b75d17c3e7488975c4355a9cfb55dd8f64ac2536690f99a77dee74757edc91f8a1a837cce92e7aa068ff2ac196f936a64fd791481ef9e227db7025d58003be62d59fd78d4191e731d01115f5371218f3e12c14bc510ed3cd5c06403fad08c10023d530358a4b606f21d8d1f5fa21b0c5b4255eb9407a8e426ae44c8163a80ed0daa8c317dd49c45a2d18aae6a5e11aad93b94e46f6d7f29fb4b451e640420d3b44ee4ec9656fde5a7dc307f8574acc47c66d94d15a480e158c6aec014137f7308d4d2a0f0dd953aad2a2a31e871e030d784ddf4034240f62fafceb53cbf3c33b8d00b359299e4747dfe175b5271ec7999650636626249599df249b6937e99a2ee377d1446712454d62ae66b365c07bc1b86afb95f2148e5c658538b5bfa72ad6ec4b78889421d5006b474b1a92206291ae132552c407791fb6fadba2c0efa5868f929c94ed4b3cca6a0684ddc27156af663904ba9bd337c82773f92292bea22f970c2884065624e801b7519bed", 0x1000}], 0x3, &(0x7f000000a0c0)=[{0x58, 0x10c, 0x8000, "df2e4ff5d193a3cd1fc4ad9700c3225191924b1544c65f6becdbba3fdb07ed36b642ba8fa6504b78469cc497459ad66b789302fd791036f79018964dee74c7a5645f42"}], 0x58}}, {{&(0x7f000000a140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @remote}, 0x1, 0x2, 0x2, 0x4}}, 0x80, &(0x7f000000a1c0)}}, {{&(0x7f000000a200)=@llc={0x1a, 0x3, 0x3, 0x0, 0xf8, 0x80, @multicast}, 0x80, &(0x7f000000a280), 0x0, &(0x7f000000a2c0)=[{0x20, 0x103, 0x15, "65cfa35b3d0566ad71d8b74e"}], 0x20}}], 0xa, 0x0) 21:32:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4d}, @mcast2}}) 21:32:50 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x8c02], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x25000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x6c, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x40000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 565.661705][T22551] EXT4-fs (loop2): re-mounted. Opts: (null) [ 565.676770][T22551] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900002e900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x70, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:51 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x8e02], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x48000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4e}, @mcast2}}) [ 565.800179][T22574] EXT4-fs (loop1): Can't read superblock on 2nd try [ 565.837557][T22591] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 565.846674][T22574] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4c000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) mount$incfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./bus\x00', &(0x7f0000000200), 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) fdatasync(r0) 21:32:51 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x9a02], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x74, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x60000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x76, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:51 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4f}, @mcast2}}) [ 565.872271][T22591] EXT4-fs (loop2): re-mounted. Opts: (null) [ 565.889629][T22591] EXT4-fs (loop2): re-mounted. Opts: (null) [ 565.911163][T22612] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900003f900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x7a, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x68000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xaa, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6c000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xba00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 566.034707][T22620] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 566.043721][T22641] EXT4-fs (loop1): Can't read superblock on 2nd try [ 566.059382][T22648] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200), 0x904820, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r1, &(0x7f0000000040)='fdinfo/4\x00') sched_setattr(r1, &(0x7f0000000080)={0x38, 0x0, 0x1000007b, 0x40, 0xe39, 0x6, 0x0, 0xf5, 0x5, 0x1}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10) 21:32:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000040900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x74000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xc0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:51 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xbf01], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b50}, @mcast2}}) [ 566.084209][T22620] incfs: Can't find or create .index dir in ./file0 [ 566.124842][T22620] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7a000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 566.127535][T22648] incfs: Can't find or create .index dir in ./file0 [ 566.147045][ T524] BUG: Dentry ffff88819b29e440{i=0,n=.index} still in use (2) [unmount of ext4 loop2] [ 566.156760][ T524] ------------[ cut here ]------------ [ 566.162230][ T524] WARNING: CPU: 0 PID: 524 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 566.170538][ T524] Modules linked in: [ 566.174434][ T524] CPU: 0 PID: 524 Comm: syz-executor.2 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0 [ 566.184481][ T524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.194541][ T524] RIP: 0010:umount_check+0x179/0x1c0 [ 566.199809][ T524] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 20 f2 e8 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 97 e5 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 566.219396][ T524] RSP: 0018:ffff8881ab34fc58 EFLAGS: 00010282 [ 566.225438][ T524] RAX: 0000000000000054 RBX: ffffffff85fa9460 RCX: 1efb70fa140f7900 [ 566.233382][ T524] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 566.241330][ T524] RBP: ffff8881f1754420 R08: ffffffff814e8767 R09: ffffed103edc5e08 [ 566.249280][ T524] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 566.257225][ T524] R13: 0000000000000002 R14: 0000000000000000 R15: ffff88819b29e440 [ 566.265176][ T524] FS: 0000000001ded400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 566.274079][ T524] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 566.280635][ T524] CR2: 00007ffdc6f52f18 CR3: 00000001ab768000 CR4: 00000000001406f0 [ 566.288585][ T524] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 566.296555][ T524] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 566.304500][ T524] Call Trace: [ 566.307773][ T524] d_walk+0x2d9/0x540 [ 566.311730][ T524] ? __d_free+0x20/0x20 [ 566.315862][ T524] shrink_dcache_for_umount+0x8a/0x1a0 [ 566.321314][ T524] generic_shutdown_super+0x63/0x2a0 [ 566.326575][ T524] kill_block_super+0x79/0xd0 [ 566.331226][ T524] deactivate_locked_super+0xaf/0x100 [ 566.336585][ T524] deactivate_super+0x1b3/0x270 [ 566.341577][ T524] ? deactivate_locked_super+0x100/0x100 [ 566.347199][ T524] ? dput+0x4de/0x5d0 [ 566.351160][ T524] ? _raw_spin_lock_irqsave+0x210/0x210 [ 566.356702][ T524] ? find_next_bit+0xc6/0x110 [ 566.361358][ T524] cleanup_mnt+0x432/0x4e0 [ 566.365754][ T524] task_work_run+0x186/0x1b0 [ 566.370321][ T524] prepare_exit_to_usermode+0x2b0/0x310 [ 566.375842][ T524] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 566.381711][ T524] RIP: 0033:0x4678b7 [ 566.385581][ T524] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 566.405160][ T524] RSP: 002b:00007ffdc6f53658 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 566.413550][ T524] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000004678b7 [ 566.421498][ T524] RDX: 00007ffdc6f5372c RSI: 0000000000000002 RDI: 00007ffdc6f53720 21:32:51 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xc005], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xa0040000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:51 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xd202], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 566.429448][ T524] RBP: 00007ffdc6f53720 R08: 00000000ffffffff R09: 00007ffdc6f534f0 [ 566.437394][ T524] R10: 0000000001deebeb R11: 0000000000000246 R12: 00000000004becda [ 566.445339][ T524] R13: 00007ffdc6f547f0 R14: 0000000001deeb00 R15: 00007ffdc6f54830 [ 566.453306][ T524] ---[ end trace 5003755935f2a172 ]--- [ 566.470253][ T524] VFS: Busy inodes after unmount of loop2. Self-destruct in 5 seconds. Have a nice day... 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xc0050000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 566.481719][T22657] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:51 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xd602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b51}, @mcast2}}) 21:32:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x2, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000048900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xf8010000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x3000) mount(&(0x7f0000000280)=@sr0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='pvfs2\x00', 0x2109010, &(0x7f0000000340)='\x00') creat(&(0x7f0000002cc0)='./file1\x00', 0x182) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) accept4(r1, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80, 0x80000) fdatasync(r0) syncfs(r0) umount2(&(0x7f0000000140)='./file0\x00', 0x9) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getpeername$unix(r3, &(0x7f0000002c00), &(0x7f0000002c80)=0x6e) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg(r2, &(0x7f0000002b40)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000380)="aed9e87ef4bef05dd5fcb62df587a862245a6d9036e18f1502cd23f1fc085458f90c1cbb9d12505a495271494fdc95f97020cdf4e2baeb940f488dad8e14bb2d33b48041e9edeabccfe7c54831e95af3aa4fbf58c6f4ebdbdfe291d9ce1e5e724e22e69d9a8b3fc10bacd3949d80137b92089fac46804a630d3ad7cf6da265fdd2dd077049abc64352eb2c1f5241b22ca91b7b5b87ea57070a0ddb718009904dc74e094db0eb23774445fb", 0xab}, {&(0x7f0000000440)="8b9810c7a65daf2ce41aae5c708f6f801921d9b45d2243942813bd95164013491d58d1abe2f8fe45ab20cbf207b2b919512fe0d514375df038dfd95111f27d481767abed94c7161cbd258602867ada313c8faf05d5e0391486d02d90e5bbb3fd22244d9e56ba42018f6c8ee7b04486f47174df11b8f7328b29258009c266edfc275804241a5517a53be290833673472b0dcae98e9b0964ceda75efb9ae9387870d112367d298e02c9f224056c3e58a20bbe080ceb643b8941a6a3960ca570cc220a41e02d79035f283a6cb10f495b8cd439f0b5d6208b9437edf48f76a4c8504a8318b65703bd92ac7720330fae514e6518d9f89977915bbace093e1cb2c", 0xfe}, {&(0x7f0000000540)="690a8f8f02317177dfad53131019eae1fce0b821160532623ae95d", 0x1b}], 0x3, &(0x7f00000005c0)=[{0xd8, 0x10d, 0x401, "33d4ddd91ef52ec70f9ba00751ff3c3e820bdaef3e7b9ecca2eacca32b132cae9ce50cfa730d48b23c40d11eb625c8df2505ab8e4723a5975493fc1da09bad36f6c281ebfa5a4c2ab3be1bca28e5e5f29a6aff246aec29227379f68a1adc6ba0bc1be706e9a69c26e2a3de45db23d161445d43bacc6c0be0474e4af0a063fce72af5a325e832bceb0ce6c657d089741ff783b96c3382df3bed5fec2548aa1d375c52c75f601b19b03bbd75a3864dccf93c5943724dc6b4c0d85245c2a5d78d27d6a5f8604131dce5"}, {0x88, 0x1, 0x5, "2bce6edafbdd5ee25e6e00978bc325bb9a4a77906a8bf12d2a8d7033828c81e7b1912d6674047f6467974f956f74c12da50b5a432e9114f61e0bec78c233f453261e8b4b9f49426b228b5f58094a19f48be37f8c42ecd6ef9ab8c7a35871aab39c0b850b1d0f5899f0fe03d0d32550b5752ca868fc59f576"}, {0xe0, 0x11, 0x2, "09532cf80cacbc617549b0d7fa4d2418769accfe37aad6e7c3fab6bcb1ae99301d505289baaabafb0200aad3e8be3874f65b1b10b628875e7771908dcce6a8a0470d805a41c629c8e63d185ccf3b0aaddea762f1f3e492784e6d2b26fac33fc386b9203dcb90d41bdf69de4f2fafa06e8018af425be2b6139c1bc646d6692d7f6d525543b8a48785c8e628ed1dae024c8a4f5bca93a29af3886bd1ec8d7cc75c6b1caf6d6382621c1117fe938116a07ed4cc72d267871eab162ede67df0db2a9b38cce93024fcf49d25e7c"}, {0x90, 0x10c, 0xff, "de3840eceb15450da9ffe996d17cd8210c2fa750ab85bacd87ec81ebd5316f9f22613dba315db8aabb885d75812f549c0b008e7c8c182a0f05c0371b3b93adb30e60b28733e3d43d639414676fe9034e02faefa953a2bea80c3d65038eca8cc97020cbe0d0d9944d7f979cf36fa3b24528fa24a887504ed1a3fb943734195d91"}, {0xb0, 0x112, 0x5, "07c9d56aea6fad54ba0de741e2c9296a23df02e1aad5af3fb0ca22ad72696cdb8bf9f791a5d357769903f13c798e16b22a3d612a7ffb570f3d051f71d61a36cf698a492a7fc7e29da5a32e3e55dc287784ccea2ad825e96add113aecc488ed45898c4b24ac4ac382a456b40dd86df4db8f71d93a5c78943169b8456b59a8d6e86bf7490a3e298075c30311a6b090843a6a7488fea666923fb234"}, {0x50, 0x113, 0x2, "9807eeb7d1b27c5e03c305feb7ee89774e5f8884c2c271df3e499b515f815da6b53913676afca0276eb8bcefd6003d5e83bc15a5526153073ec9"}, {0x40, 0x117, 0x147, "854ec0f6e794f6e8e679438bdd5368f5bd3719daf7278c44e0d6be069b5ea32a00ebe8d60e6705008041d132a70b76bf"}, {0xb0, 0x107, 0x9, "a5d8b0e984b3e1e5e760c8f69baf1f19044ac80726cfd8e41ad52332857f285447e294279ad55b7b84f8dd315a7e2ebcf81650c9cb9df17e1863e197c2987afff40452482d41ea8c330806f5cce72edbbfe7df49eb2d1d3a58db4631d32a7ec1e2417b5956d6f36ea6332543368aeca531b2ec46b0918e6e0dfba1e9d7d80a61c377a93e46b5e833b420c66033eef358441d1d9638928911ad7791"}, {0xc8, 0x10c, 0x4, "f04b474cb8b53c87621827937153535612e63418b8a586a77d168090ecbcf6fee60ed4c6b6b00331a6cbc7dcec0afb254ee92f0a49535d15253d8285441959df8020cd3dd91212631ff194e41eb9229187fe3d4f7cea76d6ef04ce43cc22515f187d3fe7504d7c4b7726770bc5a390b95d472f657ffdbb663f626442fe6f708e761ea988156a5b669edcb9a6f5aec5da61a4bbef1e00a606c5689d694cd05db10d80bba78286c19aa34250af33b51d6bdab454f90e"}], 0x588}}, {{&(0x7f0000000b80)=@isdn={0x22, 0x7, 0xff, 0x0, 0xff}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000c00)="a4759caf8d600ab388cf578f74ee", 0xe}, {&(0x7f0000000c40)="84806dd302b0304b2e55bb7832797121faaa52ab579a3d1cc6c1744a466af705890603a6854d51dbc99b9f45204af41d3524ac8692a142a709355765fcc277b952221a0ea6247d12d09ff0c8911c5aceb418366f6b3fd2b694bdbd778351ad34080042e68c739d0a0906dbcbbfbf69698e38936f0ad42ba74b88b6c3b8f5b7fa3e52ebb33572c0e4e81f83a56657476dffabc3d87331", 0x96}, {&(0x7f0000000d00)="b993c13eac07254c13f3a44cb9a5f01f51d7664cae37837f3df69f46759ac0415352efda4d8c91fe8506a787073ad01158471d47e892a2213e335b483fe8295f1c39d04cc09cb5c1052fae0d", 0x4c}, {&(0x7f0000000d80)="fa3da7b2130cc082743c8b04bc51f15bae181956d443310781a6f72dbb1c02c9d898232d666dffcd781c42064e01a5359d7683fc63bfac7a27f0763ada335a24fc10ada16880c2d34cbad92d", 0x4c}, {&(0x7f0000000e00)="925622f275398ef02742795a377238d3f4944fe5e9f36bd0735a3cfaf21908e8f5bc0ee5a6b1c5d17a95154b2562c4", 0x2f}, {&(0x7f0000000e40)="2af64f0194fe24c6d54c33bfd30ad0f109bccb16060b221ecbc0f68831689cfa9fdec9aaed0e6fa0c4fa68cab503aca1df1d69b33a1efe1e03dc6aa33b0d9d4e48dee1aa6eb65178aa2918e2cf3eea097931578619eb119592a01591da59b97a64e4d9ee179d097b745cf5ab554b06f262b75f9b87d0e3f09d89aa81bf4badccf0d697177b251bb27d6b6f1172b98fbb6bcb1ed0bc95d6eccfa32ae175f8e60a73f27bfb8f334f0728adbd9659854f99364a31ad211481543ab7e6499fb0d8eabbe25db0b7b8bb0e26ddd3c7db6590a5df4bd547", 0xd4}, {&(0x7f0000000f40)="d9d14dd6d69e602011d79cba22473265c4f206ba4125c0a34c23c4d4cf5e0254f3c810fca34953164a7787171f22e6cb24e8c1a3bf9fe14ab148743cb9f999882ac97bd18111afd36b914fdc150a244146ca515397cad971d15204db8c21a66192bad3a08d47c8d34b92a7ae850d09d316557248a975f2a15a0bc0613357a2bf52bb90b58b80d948f0e544f016ef827a4a2901abeabc81a54230289dcfa512db5b662891676c39342675071eb7e3f5d08eb376fddb3203986760b114431fa1722fa521b828b762d8e093d117", 0xcc}, {&(0x7f0000001040)="1513e26fe99f7c363a3a5c62cdc9872132d50dcf34c4d02996a8e153911a3fc435c08896002631c810f5248b2e1e4c6c7ac03dd5ea4a582860ce4d915ee20896", 0x40}, {&(0x7f0000001080)="d50928c7fa0e392a2e70fe534eb40bbb1fc1d644ef983c70502b41cf2c7a7136cf5ffe487ef08ccd74ead6cc9c0dbb9b229bd61ac4dd5a5feadcbd7bcce54203f6a018b0a406f65e07896b053267baa002c48b6bbf6dc1b73bf8475c94019d8dadeca8753c", 0x65}], 0x9, &(0x7f00000011c0)=[{0xd8, 0x118, 0x32a5, "cb515ac1f6327b68949eef50899650cb52adb05af72211a1450b1f8adc52587c4520f9d28add15b2a055cff2476b18db1343dfbb59d5e113d36b1d1a39e9cf51e045415b82fa701a1c58bd048766a16b5111eb5731b81ad6a7b4f800c4f935b19e1f3650e566919ca731027a8910d71bf96040ef18ea22b4d34a3217c071de9400cbbba3aa43681ef72cace65c04e8e4cb996b621b77df8316ac8fb77f21ae04812ba5290032a355dcb878b51a5c9489ce86a1fd4c565080b5291d18feaf2169ac6f2b25a28e87"}], 0xd8}}, {{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f00000012c0)="3cab6abca53432f18f48a6b690dacd3e78d1b5de92192ad19e6af659c15a44ea4b0e0b90868b0b5649b188c9ae8a5035fb8b87fc6948577b5a22ad87a9063a75ed781710408d13ba8fbaa6310f6f7061396abb5da289c6651b64576c975eb754b5c42acf4afc85f4313fa86d73f65c3a0f3e646dbaf264", 0x77}, {&(0x7f0000001340)="f86846b3c78f2c8a2a5ca0a775b325b9c3d5ad0e498461af925096020247b43264ffa95fe2bc469f77e1c7bc06f5f741ec02d0c36ae6c344fd91007ef8d20dbbb1674a470e4ac30946f4b1e0ffc24cb698c419e5d59ebfdcc9779db1386b5b8cf36585962f33b65be861e3f96fb121647963abec3d8644f33c6a2217bb3d118c11084b2a4349c6bf168d379d4a720e0948e80a83b9439f9c79b74e04163a88d5520b8c9a039439860a", 0xa9}, {&(0x7f0000001400)="187e20", 0x3}, {&(0x7f0000001440)="78823088d9e44a7be1b1cdda82c422be980d8899b3ec185571541e241867de49a945dc5439cbd276fa1d4b8f8774fda928b08821053f611a642bf5cc97821ef86e5bea22142285e20a4243e18932dc351a5f9ed177932095a51366bb5201915be21bbff4f5f3567bb7629da72e8e4d61c5fe98dfd42c013f01f0f924595577701f333b3515c3e498db9a47e40ba9e242d1c20ad5ff9e574170bbd7ceb4218e1c856481f71915ea8b360d63f93366d2f181", 0xb1}, {&(0x7f0000001500)="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", 0x1000}], 0x5, &(0x7f0000002580)=[{0x90, 0x10f, 0x7, "c2d89434f2d7ccca48fd9b7f8af57f6c31132e347d125e9ccdef293f6089ad1282af75769ca18476751121e4c213caf9107e9a933088344eecf243211f1edb497ed5f245ebd34921f8a9ffebcf6fa1f957a9484d320bb152aaac4aca5f8f9ea7cf8f22a0d9bc9deaf45a82da6351050e5bf99da492fd0533b35d2a63e749a949"}, {0x108, 0x10a, 0x9, "c8be808488be0e59d1b1f1fa5b894960daca013c5bdf36a141e4e3cca7d1fe58e9be94455f2356b3a57e4f72d7ef054d4e9f8c073f8003cbb84e1852ba3a75f6805d591b57a5ce986b74a30495e70ff834e655e58e764974ac30c4bac243cd4c18ff46c24547e8add7b9cb617efab924f9aca66c24baeec2dae202a7a82d11c3ec6f6dcf6a18280523ecfa9aaa1476c8d14be95bd3ec55f11437502fa7066b23d71f307e3d92d6d96b38081ccc7bd2f62b5ed8b85efc6190e2246ecd1d5993d89518a1b740741dd8d951d103ec0907bf63d5f4b7222de06668bb7095be57608879299e453488e2308576eb4dcbfeb4d7c114"}, {0xc0, 0x116, 0x8, "1ef835980e27752ceca35511cf7a3a1361ae17152c925d1abaf88f2bfd8e1af71051d2d28a85bf7a7adf20f26dd4d4634c529fd50cf6f3e9d7a511bb64ef1bba198e5e4267462ae0fecf7c07a4923ba2434df12581016508cfee51d3ac00eb2058e7ba48f89f28c89da27c3dd10b3c94e6b664c21d3f62f4c67a5371b440b3419553a8a015277a4088e240cb09cd397eb72042bb9b7ed04399ef512ed7789f48db2f661a959914b51304c132babe32"}, {0x90, 0x110, 0x7, "347b99b7f764126d8044655a7541dffdd2b076fbcaa9df1f393e1c5612b2ff37034cb20dcc299dce3506a23eedcb732453400f9ae6cdcf318c478ac8d9b34c58b63758a6211770c34010d6bb83272f645d316efd985405fd0bea78b92d4551756b794756bb4e83345a581700fc01fe1411a1d8793099cc4abafd1c9cea155d21"}, {0xc0, 0x107, 0xc9, "6f48f9f7329faf60f6ec21edcdeb89a54e8fd429815d5f65070100351d3fbae30285edc7dd4823849efb47a9a1479413fadb84a7d444be21b5d7e465e40f4d80b184c2181d2ef9ef04b38b319ba0f63fa22fb9c08baef9192120f3b92c17c219f49927e86887bda37b7c352fea289a01ea7ea22c5c796e627e78f5074882db60e5f54f2a69e152538258e20d26a43d1100e1669aec958b58fe72510d30fd2a8bc3e11c1760096f9e0866d4b145fdd8"}, {0x100, 0x109, 0x3, "1575d59daf1ea9f857f1de2f90a390af3ee4eb95373b34943c862bc6ee13936c65725e91e47f915be586c59343539927bf3a8c3c19bbedf5b3242bf4780a93e9c65823aa4376463b304ae6047af4b97e945c7002186e3614db95abcc9c067b31a50a192365f9b11b7a7c787e932dd99f1a63af4d336c4c401c3fe5570846b19f950b987b74d21ad2745663c8c6b192f618233704ba1b44739b5c682ad992e80bbecd198fde083c6a832e893d92528b55c36441aa5199c37efd68153a3b34bd8f9bd41dea33213a29b31b45a8994b799e135eab6b0aa01ac3d9bcca7eda969306c4ee36b5c6ba658c416a48"}, {0x100, 0x10f, 0x3, "99a85c067b0b698fe1e73e504104185f927102dd5ca322acff1379b090ac98fe4d51b3dcd8255ac9479af4c2ab642ffb91b176743a59dc3de9dd3c4c84ab9cae3a92435a1c8a1145501fc2c58d6f93de58a8b869d7776b0312f061b9f7e46b350b4ff98789011e5c2115d0ee589d80d9d3f25d4340f3dd3b9a9fd036a315049b1f27f76cf0e7f1c6eae827234fbd076533684e3f3051872f81764b6cdfc6959810bd303096a0d20b59f923686664e426698b8d6c938f07d93989d42cac9a05198457cc3eacb0e79df85a8d56f9818164359b486bc5455e5dc0d3b8d74575657f461b16ad5bf08966bb005083"}], 0x5a8}}], 0x3, 0x810) 21:32:51 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xdb00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 566.572168][T22657] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:51 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xe401], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x2], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:51 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b52}, @mcast2}}) 21:32:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x3, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 566.678792][T22701] EXT4-fs (loop1): Can't read superblock on 2nd try [ 566.704262][T22704] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 21:32:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900004c900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x3], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xe803], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x4], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 566.728776][T22704] EXT4-fs (loop2): re-mounted. Opts: (null) [ 566.737334][T22701] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xea03], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 566.787152][T22704] EXT4-fs (loop2): re-mounted. Opts: (null) [ 566.799691][T22733] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x5], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000300)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') fdatasync(r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'batadv_slave_1\x00', &(0x7f0000000080)=@ethtool_sfeatures={0x3b, 0x3, [{0x3c1e, 0x4}, {0x1ff, 0x2}, {0x3, 0x9c61}]}}) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/user\x00') fstat(r0, &(0x7f0000000280)) 21:32:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x4, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b53}, @mcast2}}) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xf602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x6], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000060900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xf801], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x5, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 566.948377][T22748] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 566.950197][T22733] EXT4-fs (loop1): Can't read superblock on 2nd try [ 566.968725][T22748] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x7], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xf803], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000280)=@ethtool_rxnfc={0x30, 0xb, 0x1, {0x11, @hdata="40567a0df769ee8b5d3a2fd17b852f1670ce19a77fb7b01da18f037b771b731deca612e27baecfac111be2eced4448e90d0b8ec5", {0x0, @random="e9e04911eafd", 0x5, 0x8, [0x2, 0x2]}, @tcp_ip4_spec={@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4e22, 0x6}, {0x0, @empty, 0x401, 0x200, [0xa42f, 0x8]}, 0x4, 0x80000000}, 0x5, [0x3c8, 0x6, 0x80000001, 0x5, 0x3]}}) 21:32:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b54}, @mcast2}}) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xfb06], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 567.061897][T22748] EXT4-fs (loop2): re-mounted. Opts: (null) [ 567.078378][T22768] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x6, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xfc06], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x9], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000068900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 567.143144][T22768] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0xa], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xfe03], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b55}, @mcast2}}) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0xb], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 567.222285][T22789] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 567.252960][T22789] EXT4-fs (loop2): re-mounted. Opts: (null) [ 567.259215][T22803] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffd}, {&(0x7f0000012600)="ed4100001000fcfffffffffffff4bf6db35d655f00000041e9835d0080", 0x1d, 0x4400}], 0x800000, &(0x7f00000000c0)=ANY=[]) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='cpuset\x00', 0x4000, &(0x7f00000002c0)='ext4\x00') mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x2) 21:32:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x7, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900006c900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1fd74], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0xc], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x40000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b56}, @mcast2}}) [ 567.282001][T22789] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0xd], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0xe], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 567.353396][T22826] EXT4-fs (loop1): Can't read superblock on 2nd try [ 567.392079][T22826] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 567.407230][T22832] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks) [ 567.468478][T22851] cgroup: Unknown parameter 'ext4' 21:32:52 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x1}, {&(0x7f0000000080)="9b000040000000000000000082e36724c6f34caa846ed2e5277033c6924568eda7800498b69b5fb37c3078010040", 0x2e, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000280)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r0, @ANYRES32=r0, @ANYRES64, @ANYBLOB="82f22277aa0bb23f136e23867b199acc30738c462e1a4177cd1f7f7806fdb7eb8f068cdc3ef7926da020d9487a1b0bfe9bb84e1363966c9b1f21eeaa3bd73a5eb6", @ANYRESOCT, @ANYRES16=r0, @ANYRES64=r1]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r2) 21:32:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000074900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x10], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x8, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b57}, @mcast2}}) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x5000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x11], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 567.501900][T22832] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks) [ 567.511994][T22832] cgroup: Unknown parameter 'ext4' 21:32:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900007a900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 567.565895][T22864] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x12], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b58}, @mcast2}}) [ 567.611523][T22864] EXT4-fs (loop1): Can't read superblock on 2nd try [ 567.616426][T22873] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 21:32:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rmdir(&(0x7f0000000040)='./file0\x00') mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x9, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x25], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:52 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x8000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b59}, @mcast2}}) 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x48], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x9000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 567.691224][T22896] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 567.715857][T22894] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000190000e3900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x4c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xa000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0xa, 0x0, 0x0, 0x0, @remote, @mcast2}}) [ 567.752995][T22904] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 567.787988][T22904] EXT4-fs (loop2): re-mounted. Opts: (null) [ 567.796565][T22894] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) fdatasync(r0) 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x60], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b5a}, @mcast2}}) 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x68], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xb000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 567.825938][T22927] EXT4-fs (loop2): re-mounted. Opts: (null) [ 567.846265][T22931] secmark_tg_check: 130 callbacks suppressed [ 567.846270][T22931] xt_SECMARK: invalid mode: 0 [ 567.864710][T22936] xt_SECMARK: invalid mode: 0 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x6c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xc000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 567.873691][T22933] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:53 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0xb, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000190000e4900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 567.916280][T22947] xt_SECMARK: invalid mode: 0 [ 567.924401][T22951] xt_SECMARK: invalid mode: 0 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x74], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xd000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 567.965572][T22949] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 567.971127][T22960] xt_SECMARK: invalid mode: 0 [ 567.982538][T22959] EXT4-fs (loop1): Can't read superblock on 2nd try [ 567.992641][T22963] xt_SECMARK: invalid mode: 0 21:32:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000190000e5900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:53 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b5b}, @mcast2}}) 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x7a], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) openat(r0, &(0x7f0000000040)='./file0\x00', 0x20200, 0x42) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) fdatasync(r0) 21:32:53 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xe000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 568.015795][T22965] EXT4-fs (loop2): re-mounted. Opts: (null) [ 568.031283][T22959] EXT4-fs (loop1): Can't read superblock on 2nd try [ 568.034897][T22949] EXT4-fs (loop2): re-mounted. Opts: (null) [ 568.058996][T22970] xt_SECMARK: invalid mode: 0 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x1f8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x10000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 568.072962][T22974] xt_SECMARK: invalid mode: 0 21:32:53 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0xc, 0x0, 0x0, 0x0, @remote, @mcast2}}) 21:32:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000fff900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x300], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x11000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) [ 568.123683][T22982] xt_SECMARK: invalid mode: 0 [ 568.129243][T22983] xt_SECMARK: invalid mode: 0 [ 568.147757][T22973] EXT4-fs (loop1): Can't read superblock on 2nd try 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x4a0], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000002900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 568.212125][T22987] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 568.224402][T22994] EXT4-fs (loop1): Can't read superblock on 2nd try [ 568.225779][T22987] EXT4-fs (loop2): re-mounted. Opts: (null) 21:32:53 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b5c}, @mcast2}}) 21:32:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x121000, 0x5) fdatasync(r0) 21:32:53 executing program 4: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x12000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x500], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe) 21:32:53 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e030