xq_info_reg+0x18e/0x2f0
[  529.311544][T20526]  ? __rcu_read_lock+0x50/0x50
[  529.316305][T20526]  ? alloc_netdev_mqs+0xa0c/0xc60
[  529.321311][T20526]  ? vti6_locate+0x551/0x910
[  529.325876][T20526]  vti6_locate+0x610/0x910
[  529.330276][T20526]  ? cap_capable+0x23f/0x280
[  529.334842][T20526]  ? vti6_link_config+0x530/0x530
[  529.339853][T20526]  ? vti6_ioctl+0xa64/0x1b10
[  529.344423][T20526]  vti6_ioctl+0xa88/0x1b10
[  529.348816][T20526]  ? vti6_tnl_xmit+0x1720/0x1720
[  529.353730][T20526]  ? __rcu_read_lock+0x50/0x50
[  529.358470][T20526]  ? check_preemption_disabled+0x154/0x330
[  529.364253][T20526]  ? avc_has_extended_perms+0xb5e/0x1140
[  529.369859][T20526]  ? full_name_hash+0xb4/0xe0
[  529.374513][T20526]  dev_ifsioc+0x675/0xa70
[  529.378818][T20526]  ? mutex_lock+0xa6/0x110
[  529.383225][T20526]  ? dev_ioctl+0xab0/0xab0
[  529.387614][T20526]  dev_ioctl+0x558/0xab0
[  529.391832][T20526]  sock_ioctl+0x677/0x760
[  529.396134][T20526]  ? sock_poll+0x2f0/0x2f0
[  529.400805][T20526]  ? memset+0x1f/0x40
[  529.404758][T20526]  ? fsnotify+0x1332/0x13f0
[  529.409236][T20526]  ? sock_poll+0x2f0/0x2f0
[  529.413627][T20526]  do_vfs_ioctl+0x76a/0x1720
[  529.418192][T20526]  ? selinux_file_ioctl+0x72f/0x990
[  529.423365][T20526]  ? ioctl_preallocate+0x250/0x250
[  529.428458][T20526]  ? __fget+0x37b/0x3c0
[  529.432590][T20526]  ? vfs_write+0x422/0x4e0
[  529.436978][T20526]  ? fget_many+0x20/0x20
[  529.441195][T20526]  ? debug_smp_processor_id+0x20/0x20
[  529.446627][T20526]  ? security_file_ioctl+0x9d/0xb0
[  529.451732][T20526]  __x64_sys_ioctl+0xd4/0x110
[  529.456401][T20526]  do_syscall_64+0xcb/0x1e0
[  529.460895][T20526]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
21:32:14 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xba00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  529.466761][T20526] RIP: 0033:0x466459
[  529.470629][T20526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  529.491340][T20526] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  529.499723][T20526] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  529.507756][T20526] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:14 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x12, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:14 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x3}, @mcast2}})

21:32:14 executing program 0 (fault-call:8 fault-nth:39):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:14 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xbf01], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:14 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

[  529.515703][T20526] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  529.523649][T20526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  529.531593][T20526] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  529.568944][T20523] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  529.587038][T20542] x_tables: duplicate underflow at hook 2
[  529.599319][T20545] FAULT_INJECTION: forcing a failure.
[  529.599319][T20545] name failslab, interval 1, probability 0, space 0, times 0
[  529.615586][T20545] CPU: 0 PID: 20545 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  529.622651][T20527] EXT4-fs (loop1): Can't read superblock on 2nd try
[  529.625833][T20545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  529.625838][T20545] Call Trace:
[  529.625865][T20545]  dump_stack+0x1d8/0x24e
[  529.650344][T20545]  ? devkmsg_release+0x11c/0x11c
[  529.655270][T20545]  ? mutex_unlock+0x19/0x40
[  529.659750][T20545]  ? show_regs_print_info+0x12/0x12
[  529.664922][T20545]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  529.671051][T20545]  should_fail+0x6f6/0x860
[  529.675442][T20545]  ? setup_fault_attr+0x3d0/0x3d0
[  529.680440][T20545]  ? _raw_spin_lock+0xa3/0x1b0
[  529.685200][T20545]  ? __kernfs_new_node+0xdb/0x6d0
[  529.690196][T20545]  should_failslab+0x5/0x20
[  529.694679][T20545]  kmem_cache_alloc+0x36/0x290
[  529.699421][T20545]  __kernfs_new_node+0xdb/0x6d0
[  529.704249][T20545]  ? mutex_lock+0xa6/0x110
[  529.708654][T20545]  ? kernfs_new_node+0x160/0x160
[  529.713568][T20545]  ? kernfs_activate+0x3fc/0x420
[  529.718489][T20545]  kernfs_new_node+0x95/0x160
[  529.723143][T20545]  __kernfs_create_file+0x45/0x260
[  529.728227][T20545]  sysfs_add_file_mode_ns+0x293/0x340
[  529.733574][T20545]  internal_create_group+0x560/0xf10
[  529.738863][T20545]  ? sysfs_create_group+0x20/0x20
[  529.743858][T20545]  sysfs_create_groups+0x5d/0x130
[  529.748860][T20545]  device_add+0xa51/0x18a0
[  529.753359][T20545]  ? get_device+0x30/0x30
[  529.757769][T20545]  ? virtual_device_parent+0x50/0x50
[  529.763046][T20545]  ? pm_runtime_init+0x206/0x320
[  529.767958][T20545]  ? device_initialize+0x1d3/0x3e0
[  529.773051][T20545]  netdev_register_kobject+0x178/0x310
[  529.778506][T20545]  ? raw_notifier_call_chain+0xf2/0x110
[  529.784026][T20545]  register_netdevice+0xbc7/0x1480
[  529.789113][T20545]  ? netdev_update_lockdep_key+0x10/0x10
[  529.794722][T20545]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  529.799720][T20545]  ? __rcu_read_lock+0x50/0x50
[  529.804457][T20545]  ? alloc_netdev_mqs+0xa0c/0xc60
[  529.809476][T20545]  ? vti6_locate+0x551/0x910
[  529.814040][T20545]  vti6_locate+0x610/0x910
[  529.818434][T20545]  ? cap_capable+0x23f/0x280
[  529.822998][T20545]  ? vti6_link_config+0x530/0x530
[  529.827995][T20545]  ? vti6_ioctl+0xa64/0x1b10
[  529.832566][T20545]  vti6_ioctl+0xa88/0x1b10
[  529.836966][T20545]  ? vti6_tnl_xmit+0x1720/0x1720
[  529.841886][T20545]  ? __rcu_read_lock+0x50/0x50
[  529.846847][T20545]  ? check_preemption_disabled+0x154/0x330
[  529.852745][T20545]  ? avc_has_extended_perms+0xb5e/0x1140
[  529.858372][T20545]  ? full_name_hash+0xb4/0xe0
[  529.863025][T20545]  dev_ifsioc+0x675/0xa70
[  529.867336][T20545]  ? mutex_lock+0xa6/0x110
[  529.871747][T20545]  ? dev_ioctl+0xab0/0xab0
[  529.876159][T20545]  dev_ioctl+0x558/0xab0
[  529.880387][T20545]  sock_ioctl+0x677/0x760
[  529.884692][T20545]  ? sock_poll+0x2f0/0x2f0
[  529.889202][T20545]  ? memset+0x1f/0x40
[  529.893168][T20545]  ? fsnotify+0x1332/0x13f0
[  529.897678][T20545]  ? sock_poll+0x2f0/0x2f0
[  529.902072][T20545]  do_vfs_ioctl+0x76a/0x1720
[  529.906652][T20545]  ? selinux_file_ioctl+0x72f/0x990
[  529.911877][T20545]  ? ioctl_preallocate+0x250/0x250
[  529.916967][T20545]  ? __fget+0x37b/0x3c0
[  529.921100][T20545]  ? vfs_write+0x422/0x4e0
[  529.925493][T20545]  ? fget_many+0x20/0x20
[  529.929728][T20545]  ? debug_smp_processor_id+0x20/0x20
[  529.935187][T20545]  ? security_file_ioctl+0x9d/0xb0
[  529.940272][T20545]  __x64_sys_ioctl+0xd4/0x110
[  529.944925][T20545]  do_syscall_64+0xcb/0x1e0
[  529.949416][T20545]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  529.955301][T20545] RIP: 0033:0x466459
21:32:15 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x25, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:15 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xc005], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:15 executing program 0 (fault-call:8 fault-nth:40):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  529.959178][T20545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  529.978757][T20545] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  529.987248][T20545] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  529.995217][T20545] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  530.003166][T20545] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  530.011113][T20545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  530.019058][T20545] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  530.057071][T20554] FAULT_INJECTION: forcing a failure.
[  530.057071][T20554] name failslab, interval 1, probability 0, space 0, times 0
[  530.074637][T20554] CPU: 1 PID: 20554 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  530.075264][T20559] x_tables: duplicate underflow at hook 2
[  530.085033][T20554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  530.085037][T20554] Call Trace:
[  530.085061][T20554]  dump_stack+0x1d8/0x24e
[  530.085073][T20554]  ? devkmsg_release+0x11c/0x11c
[  530.085083][T20554]  ? mutex_unlock+0x19/0x40
[  530.085092][T20554]  ? show_regs_print_info+0x12/0x12
[  530.085112][T20554]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  530.129340][T20554]  should_fail+0x6f6/0x860
[  530.133745][T20554]  ? setup_fault_attr+0x3d0/0x3d0
[  530.138788][T20554]  ? _raw_spin_lock+0xa3/0x1b0
[  530.143531][T20554]  ? __kernfs_new_node+0xdb/0x6d0
[  530.148542][T20554]  should_failslab+0x5/0x20
[  530.153022][T20554]  kmem_cache_alloc+0x36/0x290
[  530.157766][T20554]  __kernfs_new_node+0xdb/0x6d0
[  530.162606][T20554]  ? mutex_lock+0xa6/0x110
[  530.167149][T20554]  ? kernfs_new_node+0x160/0x160
[  530.172077][T20554]  ? kernfs_activate+0x3fc/0x420
[  530.176990][T20554]  kernfs_new_node+0x95/0x160
[  530.181662][T20554]  __kernfs_create_file+0x45/0x260
[  530.186760][T20554]  sysfs_add_file_mode_ns+0x293/0x340
[  530.192186][T20554]  internal_create_group+0x560/0xf10
[  530.197461][T20554]  ? sysfs_create_group+0x20/0x20
[  530.202575][T20554]  sysfs_create_groups+0x5d/0x130
[  530.207575][T20554]  device_add+0xa51/0x18a0
[  530.211967][T20554]  ? get_device+0x30/0x30
[  530.216290][T20554]  ? virtual_device_parent+0x50/0x50
[  530.221546][T20554]  ? pm_runtime_init+0x206/0x320
[  530.226457][T20554]  ? device_initialize+0x1d3/0x3e0
[  530.231541][T20554]  netdev_register_kobject+0x178/0x310
[  530.236993][T20554]  ? raw_notifier_call_chain+0xf2/0x110
[  530.242519][T20554]  register_netdevice+0xbc7/0x1480
[  530.247603][T20554]  ? netdev_update_lockdep_key+0x10/0x10
[  530.253225][T20554]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  530.258228][T20554]  ? __rcu_read_lock+0x50/0x50
[  530.262966][T20554]  ? alloc_netdev_mqs+0xa0c/0xc60
[  530.267968][T20554]  ? vti6_locate+0x551/0x910
[  530.272556][T20554]  vti6_locate+0x610/0x910
[  530.276947][T20554]  ? cap_capable+0x23f/0x280
[  530.281509][T20554]  ? vti6_link_config+0x530/0x530
[  530.286512][T20554]  ? vti6_ioctl+0xa64/0x1b10
[  530.291082][T20554]  vti6_ioctl+0xa88/0x1b10
[  530.295484][T20554]  ? vti6_tnl_xmit+0x1720/0x1720
[  530.300410][T20554]  ? __rcu_read_lock+0x50/0x50
[  530.305275][T20554]  ? check_preemption_disabled+0x154/0x330
[  530.311177][T20554]  ? avc_has_extended_perms+0xb5e/0x1140
[  530.316789][T20554]  ? full_name_hash+0xb4/0xe0
[  530.321445][T20554]  dev_ifsioc+0x675/0xa70
[  530.325753][T20554]  ? mutex_lock+0xa6/0x110
[  530.330162][T20554]  ? dev_ioctl+0xab0/0xab0
[  530.334556][T20554]  dev_ioctl+0x558/0xab0
[  530.338777][T20554]  sock_ioctl+0x677/0x760
[  530.343081][T20554]  ? sock_poll+0x2f0/0x2f0
[  530.347472][T20554]  ? memset+0x1f/0x40
[  530.351427][T20554]  ? fsnotify+0x1332/0x13f0
[  530.355901][T20554]  ? sock_poll+0x2f0/0x2f0
[  530.360292][T20554]  do_vfs_ioctl+0x76a/0x1720
[  530.364858][T20554]  ? selinux_file_ioctl+0x72f/0x990
[  530.370042][T20554]  ? ioctl_preallocate+0x250/0x250
[  530.375140][T20554]  ? __fget+0x37b/0x3c0
[  530.379273][T20554]  ? vfs_write+0x422/0x4e0
[  530.383664][T20554]  ? fget_many+0x20/0x20
[  530.387889][T20554]  ? debug_smp_processor_id+0x20/0x20
[  530.393236][T20554]  ? security_file_ioctl+0x9d/0xb0
[  530.398322][T20554]  __x64_sys_ioctl+0xd4/0x110
[  530.402996][T20554]  do_syscall_64+0xcb/0x1e0
[  530.407485][T20554]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  530.413351][T20554] RIP: 0033:0x466459
21:32:15 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019004800900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:15 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x48, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:15 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xd202], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  530.417235][T20554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  530.436811][T20554] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  530.445199][T20554] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  530.453158][T20554] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  530.461110][T20554] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
21:32:15 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x4}, @mcast2}})

21:32:15 executing program 0 (fault-call:8 fault-nth:41):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:15 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x4c, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:15 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xd602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  530.469103][T20554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  530.477056][T20554] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  530.494744][T20549] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  530.515044][T20563] x_tables: duplicate underflow at hook 2
[  530.531474][T20565] FAULT_INJECTION: forcing a failure.
[  530.531474][T20565] name failslab, interval 1, probability 0, space 0, times 0
[  530.544274][T20565] CPU: 1 PID: 20565 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  530.554771][T20565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  530.564811][T20565] Call Trace:
[  530.568112][T20565]  dump_stack+0x1d8/0x24e
[  530.572427][T20565]  ? devkmsg_release+0x11c/0x11c
[  530.577358][T20565]  ? mutex_unlock+0x19/0x40
[  530.581840][T20565]  ? show_regs_print_info+0x12/0x12
[  530.587032][T20565]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  530.593073][T20565]  should_fail+0x6f6/0x860
[  530.597467][T20565]  ? setup_fault_attr+0x3d0/0x3d0
[  530.602477][T20565]  ? _raw_spin_lock+0xa3/0x1b0
[  530.607462][T20565]  ? __kernfs_new_node+0xdb/0x6d0
[  530.612474][T20565]  should_failslab+0x5/0x20
[  530.617068][T20565]  kmem_cache_alloc+0x36/0x290
[  530.621821][T20565]  __kernfs_new_node+0xdb/0x6d0
[  530.626659][T20565]  ? mutex_lock+0xa6/0x110
[  530.631053][T20565]  ? kernfs_new_node+0x160/0x160
[  530.635968][T20565]  ? kernfs_activate+0x3fc/0x420
[  530.640882][T20565]  kernfs_new_node+0x95/0x160
[  530.645536][T20565]  __kernfs_create_file+0x45/0x260
[  530.650623][T20565]  sysfs_add_file_mode_ns+0x293/0x340
[  530.655972][T20565]  internal_create_group+0x560/0xf10
[  530.661233][T20565]  ? sysfs_create_group+0x20/0x20
[  530.666232][T20565]  sysfs_create_groups+0x5d/0x130
[  530.671234][T20565]  device_add+0xa51/0x18a0
[  530.675627][T20565]  ? get_device+0x30/0x30
[  530.680005][T20565]  ? virtual_device_parent+0x50/0x50
[  530.685278][T20565]  ? pm_runtime_init+0x206/0x320
[  530.690206][T20565]  ? device_initialize+0x1d3/0x3e0
[  530.695328][T20565]  netdev_register_kobject+0x178/0x310
[  530.700766][T20565]  ? raw_notifier_call_chain+0xf2/0x110
[  530.706293][T20565]  register_netdevice+0xbc7/0x1480
[  530.711381][T20565]  ? netdev_update_lockdep_key+0x10/0x10
[  530.716985][T20565]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  530.721987][T20565]  ? __rcu_read_lock+0x50/0x50
[  530.726727][T20565]  ? alloc_netdev_mqs+0xa0c/0xc60
[  530.731727][T20565]  ? vti6_locate+0x551/0x910
[  530.736299][T20565]  vti6_locate+0x610/0x910
[  530.740711][T20565]  ? cap_capable+0x23f/0x280
[  530.745273][T20565]  ? vti6_link_config+0x530/0x530
[  530.750271][T20565]  ? vti6_ioctl+0xa64/0x1b10
[  530.754836][T20565]  vti6_ioctl+0xa88/0x1b10
[  530.759227][T20565]  ? vti6_tnl_xmit+0x1720/0x1720
[  530.764154][T20565]  ? __rcu_read_lock+0x50/0x50
[  530.768890][T20565]  ? check_preemption_disabled+0x154/0x330
[  530.774699][T20565]  ? avc_has_extended_perms+0xb5e/0x1140
[  530.780302][T20565]  ? full_name_hash+0xb4/0xe0
[  530.784954][T20565]  dev_ifsioc+0x675/0xa70
[  530.789259][T20565]  ? mutex_lock+0xa6/0x110
[  530.793646][T20565]  ? dev_ioctl+0xab0/0xab0
[  530.798033][T20565]  dev_ioctl+0x558/0xab0
[  530.802249][T20565]  sock_ioctl+0x677/0x760
[  530.806551][T20565]  ? sock_poll+0x2f0/0x2f0
[  530.810938][T20565]  ? memset+0x1f/0x40
[  530.814918][T20565]  ? fsnotify+0x1332/0x13f0
[  530.819403][T20565]  ? sock_poll+0x2f0/0x2f0
[  530.823798][T20565]  do_vfs_ioctl+0x76a/0x1720
[  530.828382][T20565]  ? selinux_file_ioctl+0x72f/0x990
[  530.833552][T20565]  ? ioctl_preallocate+0x250/0x250
[  530.838636][T20565]  ? __fget+0x37b/0x3c0
[  530.842765][T20565]  ? vfs_write+0x422/0x4e0
[  530.847169][T20565]  ? fget_many+0x20/0x20
[  530.851385][T20565]  ? debug_smp_processor_id+0x20/0x20
[  530.856729][T20565]  ? security_file_ioctl+0x9d/0xb0
[  530.861815][T20565]  __x64_sys_ioctl+0xd4/0x110
[  530.866466][T20565]  do_syscall_64+0xcb/0x1e0
[  530.870943][T20565]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  530.876831][T20565] RIP: 0033:0x466459
[  530.880701][T20565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  530.900390][T20565] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  530.908776][T20565] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  530.916722][T20565] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  530.924677][T20565] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
21:32:16 executing program 0 (fault-call:8 fault-nth:42):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:16 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

[  530.932625][T20565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  530.940575][T20565] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:16 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x60, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:16 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xdb00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  530.980769][T20574] x_tables: duplicate underflow at hook 2
[  530.983979][T20575] FAULT_INJECTION: forcing a failure.
[  530.983979][T20575] name failslab, interval 1, probability 0, space 0, times 0
[  531.007136][T20575] CPU: 1 PID: 20575 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  531.017403][T20575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  531.027458][T20575] Call Trace:
21:32:16 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xe401], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  531.030755][T20575]  dump_stack+0x1d8/0x24e
[  531.035086][T20575]  ? devkmsg_release+0x11c/0x11c
[  531.040028][T20575]  ? mutex_unlock+0x19/0x40
[  531.044539][T20575]  ? show_regs_print_info+0x12/0x12
[  531.049746][T20575]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  531.050815][T20571] EXT4-fs (loop1): Can't read superblock on 2nd try
[  531.055809][T20575]  should_fail+0x6f6/0x860
[  531.055825][T20575]  ? setup_fault_attr+0x3d0/0x3d0
[  531.067275][T20587] x_tables: duplicate underflow at hook 2
[  531.071819][T20575]  ? _raw_spin_lock+0xa3/0x1b0
[  531.071830][T20575]  ? __kernfs_new_node+0xdb/0x6d0
[  531.071839][T20575]  should_failslab+0x5/0x20
[  531.071848][T20575]  kmem_cache_alloc+0x36/0x290
[  531.071862][T20575]  __kernfs_new_node+0xdb/0x6d0
[  531.101482][T20575]  ? mutex_lock+0xa6/0x110
[  531.105873][T20575]  ? kernfs_new_node+0x160/0x160
[  531.110784][T20575]  ? kernfs_activate+0x3fc/0x420
[  531.115743][T20575]  kernfs_new_node+0x95/0x160
[  531.120397][T20575]  __kernfs_create_file+0x45/0x260
[  531.125479][T20575]  sysfs_add_file_mode_ns+0x293/0x340
[  531.130824][T20575]  internal_create_group+0x560/0xf10
[  531.136080][T20575]  ? sysfs_create_group+0x20/0x20
[  531.141081][T20575]  sysfs_create_groups+0x5d/0x130
[  531.146078][T20575]  device_add+0xa51/0x18a0
[  531.150468][T20575]  ? get_device+0x30/0x30
[  531.154772][T20575]  ? virtual_device_parent+0x50/0x50
[  531.160028][T20575]  ? pm_runtime_init+0x206/0x320
[  531.164938][T20575]  ? device_initialize+0x1d3/0x3e0
[  531.170029][T20575]  netdev_register_kobject+0x178/0x310
[  531.175473][T20575]  ? raw_notifier_call_chain+0xf2/0x110
[  531.181002][T20575]  register_netdevice+0xbc7/0x1480
[  531.186114][T20575]  ? netdev_update_lockdep_key+0x10/0x10
[  531.191724][T20575]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  531.196725][T20575]  ? __rcu_read_lock+0x50/0x50
[  531.201463][T20575]  ? alloc_netdev_mqs+0xa0c/0xc60
[  531.206457][T20575]  ? vti6_locate+0x551/0x910
[  531.211016][T20575]  vti6_locate+0x610/0x910
[  531.215408][T20575]  ? cap_capable+0x23f/0x280
[  531.219975][T20575]  ? vti6_link_config+0x530/0x530
[  531.224978][T20575]  ? vti6_ioctl+0xa64/0x1b10
[  531.229537][T20575]  vti6_ioctl+0xa88/0x1b10
[  531.233926][T20575]  ? vti6_tnl_xmit+0x1720/0x1720
[  531.238838][T20575]  ? __rcu_read_lock+0x50/0x50
[  531.243592][T20575]  ? check_preemption_disabled+0x154/0x330
[  531.249373][T20575]  ? avc_has_extended_perms+0xb5e/0x1140
[  531.254993][T20575]  ? full_name_hash+0xb4/0xe0
[  531.259642][T20575]  dev_ifsioc+0x675/0xa70
[  531.263949][T20575]  ? mutex_lock+0xa6/0x110
[  531.268945][T20575]  ? dev_ioctl+0xab0/0xab0
[  531.273331][T20575]  dev_ioctl+0x558/0xab0
[  531.277547][T20575]  sock_ioctl+0x677/0x760
[  531.281856][T20575]  ? sock_poll+0x2f0/0x2f0
[  531.286246][T20575]  ? memset+0x1f/0x40
[  531.290199][T20575]  ? fsnotify+0x1332/0x13f0
[  531.294673][T20575]  ? sock_poll+0x2f0/0x2f0
[  531.299099][T20575]  do_vfs_ioctl+0x76a/0x1720
[  531.303661][T20575]  ? selinux_file_ioctl+0x72f/0x990
[  531.308852][T20575]  ? ioctl_preallocate+0x250/0x250
[  531.313941][T20575]  ? __fget+0x37b/0x3c0
[  531.318157][T20575]  ? vfs_write+0x422/0x4e0
[  531.322578][T20575]  ? fget_many+0x20/0x20
[  531.326831][T20575]  ? debug_smp_processor_id+0x20/0x20
[  531.332184][T20575]  ? security_file_ioctl+0x9d/0xb0
[  531.337272][T20575]  __x64_sys_ioctl+0xd4/0x110
[  531.341925][T20575]  do_syscall_64+0xcb/0x1e0
[  531.346402][T20575]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  531.352331][T20575] RIP: 0033:0x466459
[  531.356202][T20575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  531.375783][T20575] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  531.384167][T20575] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  531.392111][T20575] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  531.400054][T20575] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  531.408014][T20575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  531.415959][T20575] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:16 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019004c00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:16 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x68, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:16 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:16 executing program 0 (fault-call:8 fault-nth:43):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:16 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x6}, @mcast2}})

21:32:16 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xe803], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  531.487324][T20589] secmark_tg_check: 20 callbacks suppressed
[  531.487327][T20589] xt_SECMARK: invalid mode: 0
[  531.499195][T20591] xt_SECMARK: invalid mode: 0
[  531.513183][T20571] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:16 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x6c, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:16 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xea03], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  531.588497][T20599] FAULT_INJECTION: forcing a failure.
[  531.588497][T20599] name failslab, interval 1, probability 0, space 0, times 0
[  531.592531][T20604] x_tables: duplicate underflow at hook 2
[  531.605027][T20600] EXT4-fs (loop2): invalid first ino: 0
[  531.609246][T20605] xt_SECMARK: invalid mode: 0
[  531.612972][T20599] CPU: 0 PID: 20599 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  531.627408][T20599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  531.631561][T20608] xt_SECMARK: invalid mode: 0
[  531.637458][T20599] Call Trace:
[  531.637481][T20599]  dump_stack+0x1d8/0x24e
[  531.637508][T20599]  ? devkmsg_release+0x11c/0x11c
[  531.654696][T20599]  ? show_regs_print_info+0x12/0x12
[  531.659921][T20599]  ? mutex_lock+0xa6/0x110
[  531.664321][T20599]  ? mutex_trylock+0xb0/0xb0
[  531.668890][T20599]  ? idr_get_free+0x740/0x900
[  531.673667][T20599]  should_fail+0x6f6/0x860
[  531.678064][T20599]  ? setup_fault_attr+0x3d0/0x3d0
[  531.683074][T20599]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  531.689123][T20599]  ? __kernfs_new_node+0xdb/0x6d0
[  531.694129][T20599]  should_failslab+0x5/0x20
[  531.698613][T20599]  kmem_cache_alloc+0x36/0x290
[  531.703584][T20599]  __kernfs_new_node+0xdb/0x6d0
[  531.708416][T20599]  ? kernfs_new_node+0x160/0x160
[  531.713358][T20599]  ? security_kernfs_init_security+0x9a/0xb0
[  531.719410][T20599]  ? mutex_lock+0xa6/0x110
[  531.723806][T20599]  ? mutex_trylock+0xb0/0xb0
[  531.728375][T20599]  kernfs_new_node+0x95/0x160
[  531.733033][T20599]  __kernfs_create_file+0x45/0x260
[  531.738119][T20599]  sysfs_add_file_mode_ns+0x293/0x340
[  531.743473][T20599]  internal_create_group+0x560/0xf10
[  531.748750][T20599]  ? sysfs_create_group+0x20/0x20
[  531.753758][T20599]  sysfs_create_groups+0x5d/0x130
[  531.758767][T20599]  device_add+0xae5/0x18a0
[  531.763295][T20599]  ? get_device+0x30/0x30
[  531.767627][T20599]  ? virtual_device_parent+0x50/0x50
[  531.772894][T20599]  ? pm_runtime_init+0x206/0x320
[  531.777809][T20599]  ? device_initialize+0x1d3/0x3e0
[  531.782898][T20599]  netdev_register_kobject+0x178/0x310
[  531.788336][T20599]  ? raw_notifier_call_chain+0xf2/0x110
[  531.793866][T20599]  register_netdevice+0xbc7/0x1480
[  531.798954][T20599]  ? netdev_update_lockdep_key+0x10/0x10
[  531.804569][T20599]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  531.809571][T20599]  ? __rcu_read_lock+0x50/0x50
[  531.814316][T20599]  ? alloc_netdev_mqs+0xa0c/0xc60
[  531.819330][T20599]  ? vti6_locate+0x551/0x910
[  531.823893][T20599]  vti6_locate+0x610/0x910
[  531.828285][T20599]  ? cap_capable+0x23f/0x280
[  531.832848][T20599]  ? vti6_link_config+0x530/0x530
[  531.837844][T20599]  ? vti6_ioctl+0xa64/0x1b10
[  531.842413][T20599]  vti6_ioctl+0xa88/0x1b10
[  531.846805][T20599]  ? vti6_tnl_xmit+0x1720/0x1720
[  531.851718][T20599]  ? __rcu_read_lock+0x50/0x50
[  531.856456][T20599]  ? check_preemption_disabled+0x154/0x330
[  531.862249][T20599]  ? avc_has_extended_perms+0xb5e/0x1140
[  531.867866][T20599]  ? full_name_hash+0xb4/0xe0
[  531.872516][T20599]  dev_ifsioc+0x675/0xa70
[  531.876837][T20599]  ? mutex_lock+0xa6/0x110
[  531.881241][T20599]  ? dev_ioctl+0xab0/0xab0
[  531.885632][T20599]  dev_ioctl+0x558/0xab0
[  531.889958][T20599]  sock_ioctl+0x677/0x760
[  531.894304][T20599]  ? sock_poll+0x2f0/0x2f0
[  531.898703][T20599]  ? memset+0x1f/0x40
[  531.902772][T20599]  ? fsnotify+0x1332/0x13f0
[  531.907366][T20599]  ? sock_poll+0x2f0/0x2f0
[  531.911765][T20599]  do_vfs_ioctl+0x76a/0x1720
[  531.916336][T20599]  ? selinux_file_ioctl+0x72f/0x990
[  531.921513][T20599]  ? ioctl_preallocate+0x250/0x250
[  531.926648][T20599]  ? __fget+0x37b/0x3c0
[  531.930810][T20599]  ? vfs_write+0x422/0x4e0
[  531.935224][T20599]  ? fget_many+0x20/0x20
[  531.939443][T20599]  ? debug_smp_processor_id+0x20/0x20
[  531.944792][T20599]  ? security_file_ioctl+0x9d/0xb0
[  531.949878][T20599]  __x64_sys_ioctl+0xd4/0x110
[  531.954690][T20599]  do_syscall_64+0xcb/0x1e0
[  531.959265][T20599]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  531.965172][T20599] RIP: 0033:0x466459
[  531.969061][T20599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
21:32:17 executing program 0 (fault-call:8 fault-nth:44):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:17 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:17 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x74, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:17 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x8}, @mcast2}})

[  531.988642][T20599] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  531.997036][T20599] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  532.005067][T20599] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  532.013026][T20599] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  532.020978][T20599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  532.028943][T20599] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  532.063348][T20607] EXT4-fs (loop1): Can't read superblock on 2nd try
[  532.073931][T20616] xt_SECMARK: invalid mode: 0
[  532.085091][T20618] xt_SECMARK: invalid mode: 0
[  532.094963][T20619] FAULT_INJECTION: forcing a failure.
[  532.094963][T20619] name failslab, interval 1, probability 0, space 0, times 0
[  532.108648][T20619] CPU: 1 PID: 20619 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  532.118987][T20619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  532.129024][T20619] Call Trace:
[  532.132301][T20619]  dump_stack+0x1d8/0x24e
[  532.136677][T20619]  ? devkmsg_release+0x11c/0x11c
[  532.141588][T20619]  ? mutex_unlock+0x19/0x40
[  532.146139][T20619]  ? show_regs_print_info+0x12/0x12
[  532.151313][T20619]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  532.157378][T20619]  should_fail+0x6f6/0x860
[  532.161769][T20619]  ? setup_fault_attr+0x3d0/0x3d0
[  532.166769][T20619]  ? _raw_spin_lock+0xa3/0x1b0
[  532.171511][T20619]  ? __kernfs_new_node+0xdb/0x6d0
[  532.176513][T20619]  should_failslab+0x5/0x20
[  532.180990][T20619]  kmem_cache_alloc+0x36/0x290
[  532.185745][T20619]  __kernfs_new_node+0xdb/0x6d0
[  532.190578][T20619]  ? mutex_lock+0xa6/0x110
[  532.194967][T20619]  ? kernfs_new_node+0x160/0x160
[  532.199877][T20619]  ? security_kernfs_init_security+0x9a/0xb0
[  532.205835][T20619]  ? kernfs_activate+0x3fc/0x420
[  532.210746][T20619]  kernfs_new_node+0x95/0x160
[  532.215409][T20619]  __kernfs_create_file+0x45/0x260
[  532.220494][T20619]  sysfs_add_file_mode_ns+0x293/0x340
[  532.225853][T20619]  internal_create_group+0x560/0xf10
[  532.231111][T20619]  ? sysfs_create_group+0x20/0x20
[  532.236106][T20619]  sysfs_create_groups+0x5d/0x130
[  532.241108][T20619]  device_add+0xae5/0x18a0
[  532.245497][T20619]  ? get_device+0x30/0x30
[  532.249798][T20619]  ? virtual_device_parent+0x50/0x50
[  532.255052][T20619]  ? pm_runtime_init+0x206/0x320
[  532.259976][T20619]  ? device_initialize+0x1d3/0x3e0
[  532.265081][T20619]  netdev_register_kobject+0x178/0x310
[  532.270524][T20619]  ? raw_notifier_call_chain+0xf2/0x110
[  532.276048][T20619]  register_netdevice+0xbc7/0x1480
[  532.281133][T20619]  ? netdev_update_lockdep_key+0x10/0x10
[  532.286755][T20619]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  532.291754][T20619]  ? __rcu_read_lock+0x50/0x50
[  532.296575][T20619]  ? alloc_netdev_mqs+0xa0c/0xc60
[  532.301569][T20619]  ? vti6_locate+0x551/0x910
[  532.306130][T20619]  vti6_locate+0x610/0x910
[  532.310521][T20619]  ? cap_capable+0x23f/0x280
[  532.315086][T20619]  ? vti6_link_config+0x530/0x530
[  532.320081][T20619]  ? vti6_ioctl+0xa64/0x1b10
[  532.324643][T20619]  vti6_ioctl+0xa88/0x1b10
[  532.329032][T20619]  ? vti6_tnl_xmit+0x1720/0x1720
[  532.333942][T20619]  ? __rcu_read_lock+0x50/0x50
[  532.338678][T20619]  ? check_preemption_disabled+0x154/0x330
[  532.344475][T20619]  ? avc_has_extended_perms+0xb5e/0x1140
[  532.350078][T20619]  ? full_name_hash+0xb4/0xe0
[  532.354745][T20619]  dev_ifsioc+0x675/0xa70
[  532.359050][T20619]  ? mutex_lock+0xa6/0x110
[  532.363435][T20619]  ? dev_ioctl+0xab0/0xab0
[  532.367835][T20619]  dev_ioctl+0x558/0xab0
[  532.372071][T20619]  sock_ioctl+0x677/0x760
[  532.376378][T20619]  ? sock_poll+0x2f0/0x2f0
[  532.380769][T20619]  ? memset+0x1f/0x40
[  532.384721][T20619]  ? fsnotify+0x1332/0x13f0
[  532.389208][T20619]  ? sock_poll+0x2f0/0x2f0
[  532.393596][T20619]  do_vfs_ioctl+0x76a/0x1720
[  532.398161][T20619]  ? selinux_file_ioctl+0x72f/0x990
[  532.403343][T20619]  ? ioctl_preallocate+0x250/0x250
[  532.408444][T20619]  ? __fget+0x37b/0x3c0
[  532.412571][T20619]  ? vfs_write+0x422/0x4e0
[  532.416973][T20619]  ? fget_many+0x20/0x20
[  532.421196][T20619]  ? debug_smp_processor_id+0x20/0x20
[  532.426542][T20619]  ? security_file_ioctl+0x9d/0xb0
[  532.431628][T20619]  __x64_sys_ioctl+0xd4/0x110
[  532.436278][T20619]  do_syscall_64+0xcb/0x1e0
[  532.440769][T20619]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  532.446637][T20619] RIP: 0033:0x466459
[  532.450504][T20619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  532.470085][T20619] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  532.478492][T20619] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  532.486442][T20619] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  532.494389][T20619] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  532.502352][T20619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:32:17 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:17 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:17 executing program 0 (fault-call:8 fault-nth:45):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:17 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

[  532.510297][T20619] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:17 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x7a, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:17 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf801], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  532.544637][T20625] EXT4-fs (loop2): invalid first ino: 0
[  532.575463][T20630] xt_SECMARK: invalid mode: 0
[  532.578666][T20631] FAULT_INJECTION: forcing a failure.
[  532.578666][T20631] name failslab, interval 1, probability 0, space 0, times 0
21:32:17 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  532.583721][T20632] xt_SECMARK: invalid mode: 0
[  532.594163][T20631] CPU: 0 PID: 20631 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  532.607980][T20631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  532.618043][T20631] Call Trace:
[  532.621337][T20631]  dump_stack+0x1d8/0x24e
[  532.625672][T20631]  ? devkmsg_release+0x11c/0x11c
[  532.630608][T20631]  ? mutex_unlock+0x19/0x40
[  532.635117][T20631]  ? show_regs_print_info+0x12/0x12
21:32:17 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x2], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  532.640319][T20631]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  532.642569][T20637] xt_SECMARK: invalid mode: 0
[  532.646382][T20631]  should_fail+0x6f6/0x860
[  532.646392][T20631]  ? setup_fault_attr+0x3d0/0x3d0
[  532.646409][T20631]  ? _raw_spin_lock+0xa3/0x1b0
[  532.651659][T20638] xt_check_table_hooks: 2 callbacks suppressed
[  532.651665][T20638] x_tables: duplicate underflow at hook 2
[  532.655457][T20631]  ? __kernfs_new_node+0xdb/0x6d0
[  532.655467][T20631]  should_failslab+0x5/0x20
[  532.655483][T20631]  kmem_cache_alloc+0x36/0x290
[  532.680631][T20641] x_tables: duplicate underflow at hook 2
[  532.682094][T20631]  __kernfs_new_node+0xdb/0x6d0
[  532.682106][T20631]  ? mutex_lock+0xa6/0x110
[  532.682120][T20631]  ? kernfs_new_node+0x160/0x160
[  532.713878][T20646] x_tables: duplicate underflow at hook 2
[  532.716205][T20631]  ? security_kernfs_init_security+0x9a/0xb0
[  532.716218][T20631]  ? kernfs_activate+0x3fc/0x420
[  532.716233][T20631]  kernfs_new_node+0x95/0x160
[  532.737455][T20631]  __kernfs_create_file+0x45/0x260
[  532.742553][T20631]  sysfs_add_file_mode_ns+0x293/0x340
[  532.747898][T20631]  internal_create_group+0x560/0xf10
[  532.753160][T20631]  ? sysfs_create_group+0x20/0x20
[  532.758154][T20631]  sysfs_create_groups+0x5d/0x130
[  532.763153][T20631]  device_add+0xae5/0x18a0
[  532.767553][T20631]  ? get_device+0x30/0x30
[  532.771853][T20631]  ? virtual_device_parent+0x50/0x50
[  532.777117][T20631]  ? pm_runtime_init+0x206/0x320
[  532.782036][T20631]  ? device_initialize+0x1d3/0x3e0
[  532.787991][T20631]  netdev_register_kobject+0x178/0x310
[  532.793423][T20631]  ? raw_notifier_call_chain+0xf2/0x110
[  532.798942][T20631]  register_netdevice+0xbc7/0x1480
[  532.804025][T20631]  ? netdev_update_lockdep_key+0x10/0x10
[  532.809626][T20631]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  532.814633][T20631]  ? __rcu_read_lock+0x50/0x50
[  532.819366][T20631]  ? alloc_netdev_mqs+0xa0c/0xc60
[  532.824446][T20631]  ? vti6_locate+0x551/0x910
[  532.829007][T20631]  vti6_locate+0x610/0x910
[  532.833396][T20631]  ? cap_capable+0x23f/0x280
[  532.837979][T20631]  ? vti6_link_config+0x530/0x530
[  532.842987][T20631]  ? vti6_ioctl+0xa64/0x1b10
[  532.847547][T20631]  vti6_ioctl+0xa88/0x1b10
[  532.851936][T20631]  ? vti6_tnl_xmit+0x1720/0x1720
[  532.856850][T20631]  ? __rcu_read_lock+0x50/0x50
[  532.861587][T20631]  ? check_preemption_disabled+0x154/0x330
[  532.867393][T20631]  ? avc_has_extended_perms+0xb5e/0x1140
[  532.872998][T20631]  ? full_name_hash+0xb4/0xe0
[  532.877649][T20631]  dev_ifsioc+0x675/0xa70
[  532.881950][T20631]  ? mutex_lock+0xa6/0x110
[  532.886437][T20631]  ? dev_ioctl+0xab0/0xab0
[  532.890844][T20631]  dev_ioctl+0x558/0xab0
[  532.895065][T20631]  sock_ioctl+0x677/0x760
[  532.899365][T20631]  ? sock_poll+0x2f0/0x2f0
[  532.903753][T20631]  ? memset+0x1f/0x40
[  532.907707][T20631]  ? fsnotify+0x1332/0x13f0
[  532.912180][T20631]  ? sock_poll+0x2f0/0x2f0
[  532.916569][T20631]  do_vfs_ioctl+0x76a/0x1720
[  532.921146][T20631]  ? selinux_file_ioctl+0x72f/0x990
[  532.926340][T20631]  ? ioctl_preallocate+0x250/0x250
[  532.931450][T20631]  ? __fget+0x37b/0x3c0
[  532.935578][T20631]  ? vfs_write+0x422/0x4e0
[  532.939965][T20631]  ? fget_many+0x20/0x20
[  532.944265][T20631]  ? debug_smp_processor_id+0x20/0x20
[  532.949607][T20631]  ? security_file_ioctl+0x9d/0xb0
[  532.954692][T20631]  __x64_sys_ioctl+0xd4/0x110
[  532.959343][T20631]  do_syscall_64+0xcb/0x1e0
[  532.963820][T20631]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  532.969685][T20631] RIP: 0033:0x466459
[  532.973552][T20631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
21:32:18 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf803], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:18 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

[  532.993128][T20631] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  533.001509][T20631] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  533.009452][T20631] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  533.017398][T20631] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  533.026475][T20631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  533.034419][T20631] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:18 executing program 0 (fault-call:8 fault-nth:46):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:18 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0xa}, @mcast2}})

[  533.050291][T20648] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  533.092089][T20653] xt_SECMARK: invalid mode: 0
[  533.095759][T20645] EXT4-fs (loop1): Can't read superblock on 2nd try
[  533.117470][T20657] FAULT_INJECTION: forcing a failure.
[  533.117470][T20657] name failslab, interval 1, probability 0, space 0, times 0
[  533.120884][T20654] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  533.145179][T20657] CPU: 1 PID: 20657 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  533.155508][T20657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  533.165594][T20657] Call Trace:
[  533.168866][T20657]  dump_stack+0x1d8/0x24e
[  533.173222][T20657]  ? devkmsg_release+0x11c/0x11c
[  533.178148][T20657]  ? mutex_unlock+0x19/0x40
[  533.182644][T20657]  ? show_regs_print_info+0x12/0x12
[  533.187817][T20657]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  533.193855][T20657]  should_fail+0x6f6/0x860
[  533.198263][T20657]  ? setup_fault_attr+0x3d0/0x3d0
[  533.203260][T20657]  ? _raw_spin_lock+0xa3/0x1b0
[  533.208002][T20657]  ? __kernfs_new_node+0xdb/0x6d0
[  533.213004][T20657]  should_failslab+0x5/0x20
[  533.217498][T20657]  kmem_cache_alloc+0x36/0x290
[  533.222264][T20657]  __kernfs_new_node+0xdb/0x6d0
[  533.227087][T20657]  ? mutex_lock+0xa6/0x110
[  533.231489][T20657]  ? kernfs_new_node+0x160/0x160
[  533.236439][T20657]  ? security_kernfs_init_security+0x9a/0xb0
[  533.242410][T20657]  ? kernfs_activate+0x3fc/0x420
[  533.247331][T20657]  kernfs_new_node+0x95/0x160
[  533.252069][T20657]  __kernfs_create_file+0x45/0x260
[  533.257171][T20657]  sysfs_add_file_mode_ns+0x293/0x340
[  533.262523][T20657]  internal_create_group+0x560/0xf10
[  533.267799][T20657]  ? sysfs_create_group+0x20/0x20
[  533.272795][T20657]  sysfs_create_groups+0x5d/0x130
[  533.277815][T20657]  device_add+0xae5/0x18a0
[  533.282203][T20657]  ? get_device+0x30/0x30
[  533.286517][T20657]  ? virtual_device_parent+0x50/0x50
[  533.291780][T20657]  ? pm_runtime_init+0x206/0x320
[  533.296791][T20657]  ? device_initialize+0x1d3/0x3e0
[  533.301893][T20657]  netdev_register_kobject+0x178/0x310
[  533.307340][T20657]  ? raw_notifier_call_chain+0xf2/0x110
[  533.312859][T20657]  register_netdevice+0xbc7/0x1480
[  533.318053][T20657]  ? netdev_update_lockdep_key+0x10/0x10
[  533.323682][T20657]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  533.328700][T20657]  ? __rcu_read_lock+0x50/0x50
[  533.333443][T20657]  ? alloc_netdev_mqs+0xa0c/0xc60
[  533.338456][T20657]  ? vti6_locate+0x551/0x910
[  533.343037][T20657]  vti6_locate+0x610/0x910
[  533.347429][T20657]  ? cap_capable+0x23f/0x280
[  533.351997][T20657]  ? vti6_link_config+0x530/0x530
[  533.357013][T20657]  ? vti6_ioctl+0xa64/0x1b10
[  533.361594][T20657]  vti6_ioctl+0xa88/0x1b10
[  533.366014][T20657]  ? vti6_tnl_xmit+0x1720/0x1720
[  533.370927][T20657]  ? __rcu_read_lock+0x50/0x50
[  533.375663][T20657]  ? check_preemption_disabled+0x154/0x330
[  533.381443][T20657]  ? avc_has_extended_perms+0xb5e/0x1140
[  533.387052][T20657]  ? full_name_hash+0xb4/0xe0
[  533.391703][T20657]  dev_ifsioc+0x675/0xa70
[  533.396006][T20657]  ? mutex_lock+0xa6/0x110
[  533.400395][T20657]  ? dev_ioctl+0xab0/0xab0
[  533.404784][T20657]  dev_ioctl+0x558/0xab0
[  533.408999][T20657]  sock_ioctl+0x677/0x760
[  533.413302][T20657]  ? sock_poll+0x2f0/0x2f0
[  533.417694][T20657]  ? memset+0x1f/0x40
[  533.421646][T20657]  ? fsnotify+0x1332/0x13f0
[  533.426127][T20657]  ? sock_poll+0x2f0/0x2f0
[  533.430542][T20657]  do_vfs_ioctl+0x76a/0x1720
[  533.435112][T20657]  ? selinux_file_ioctl+0x72f/0x990
[  533.440284][T20657]  ? ioctl_preallocate+0x250/0x250
[  533.445371][T20657]  ? __fget+0x37b/0x3c0
[  533.449501][T20657]  ? vfs_write+0x422/0x4e0
[  533.453892][T20657]  ? fget_many+0x20/0x20
[  533.458114][T20657]  ? debug_smp_processor_id+0x20/0x20
[  533.463460][T20657]  ? security_file_ioctl+0x9d/0xb0
[  533.468570][T20657]  __x64_sys_ioctl+0xd4/0x110
[  533.473232][T20657]  do_syscall_64+0xcb/0x1e0
[  533.477730][T20657]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  533.483598][T20657] RIP: 0033:0x466459
[  533.487474][T20657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  533.507048][T20657] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  533.515458][T20657] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  533.523403][T20657] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  533.531352][T20657] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  533.539303][T20657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  533.547256][T20657] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:18 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006800900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:18 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x3], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:18 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfb06], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:18 executing program 0 (fault-call:8 fault-nth:47):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:18 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x10}, @mcast2}})

21:32:18 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

[  533.608684][T20661] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:18 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:18 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfc06], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  533.686367][T20672] x_tables: duplicate underflow at hook 2
[  533.694941][T20675] FAULT_INJECTION: forcing a failure.
[  533.694941][T20675] name failslab, interval 1, probability 0, space 0, times 0
[  533.708977][T20675] CPU: 0 PID: 20675 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  533.719371][T20675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  533.729411][T20675] Call Trace:
[  533.732688][T20675]  dump_stack+0x1d8/0x24e
[  533.737004][T20675]  ? devkmsg_release+0x11c/0x11c
[  533.741923][T20675]  ? mutex_unlock+0x19/0x40
[  533.746415][T20675]  ? show_regs_print_info+0x12/0x12
[  533.751589][T20675]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  533.757652][T20675]  should_fail+0x6f6/0x860
[  533.762044][T20675]  ? setup_fault_attr+0x3d0/0x3d0
[  533.767054][T20675]  ? _raw_spin_lock+0xa3/0x1b0
[  533.771816][T20675]  ? __kernfs_new_node+0xdb/0x6d0
[  533.776817][T20675]  should_failslab+0x5/0x20
[  533.781313][T20675]  kmem_cache_alloc+0x36/0x290
[  533.786051][T20675]  __kernfs_new_node+0xdb/0x6d0
[  533.790880][T20675]  ? mutex_lock+0xa6/0x110
[  533.795278][T20675]  ? kernfs_new_node+0x160/0x160
[  533.800214][T20675]  ? security_kernfs_init_security+0x9a/0xb0
[  533.806176][T20675]  ? kernfs_activate+0x3fc/0x420
[  533.811090][T20675]  kernfs_new_node+0x95/0x160
[  533.815743][T20675]  __kernfs_create_file+0x45/0x260
[  533.820827][T20675]  sysfs_add_file_mode_ns+0x293/0x340
[  533.826194][T20675]  internal_create_group+0x560/0xf10
[  533.831466][T20675]  ? sysfs_create_group+0x20/0x20
[  533.836474][T20675]  sysfs_create_groups+0x5d/0x130
[  533.841482][T20675]  device_add+0xae5/0x18a0
[  533.845875][T20675]  ? get_device+0x30/0x30
[  533.850178][T20675]  ? virtual_device_parent+0x50/0x50
[  533.855439][T20675]  ? pm_runtime_init+0x206/0x320
[  533.860351][T20675]  ? device_initialize+0x1d3/0x3e0
[  533.865437][T20675]  netdev_register_kobject+0x178/0x310
[  533.872176][T20675]  ? raw_notifier_call_chain+0xf2/0x110
[  533.877697][T20675]  register_netdevice+0xbc7/0x1480
[  533.882786][T20675]  ? netdev_update_lockdep_key+0x10/0x10
[  533.888392][T20675]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  533.893396][T20675]  ? __rcu_read_lock+0x50/0x50
[  533.898131][T20675]  ? alloc_netdev_mqs+0xa0c/0xc60
[  533.903147][T20675]  ? vti6_locate+0x551/0x910
[  533.907708][T20675]  vti6_locate+0x610/0x910
[  533.912125][T20675]  ? cap_capable+0x23f/0x280
[  533.916691][T20675]  ? vti6_link_config+0x530/0x530
[  533.921687][T20675]  ? vti6_ioctl+0xa64/0x1b10
[  533.926268][T20675]  vti6_ioctl+0xa88/0x1b10
[  533.930754][T20675]  ? vti6_tnl_xmit+0x1720/0x1720
[  533.935681][T20675]  ? __rcu_read_lock+0x50/0x50
[  533.940417][T20675]  ? check_preemption_disabled+0x154/0x330
[  533.946228][T20675]  ? avc_has_extended_perms+0xb5e/0x1140
[  533.951982][T20675]  ? full_name_hash+0xb4/0xe0
[  533.956641][T20675]  dev_ifsioc+0x675/0xa70
[  533.961023][T20675]  ? mutex_lock+0xa6/0x110
[  533.965418][T20675]  ? dev_ioctl+0xab0/0xab0
[  533.969821][T20675]  dev_ioctl+0x558/0xab0
[  533.974040][T20675]  sock_ioctl+0x677/0x760
[  533.978355][T20675]  ? sock_poll+0x2f0/0x2f0
[  533.982761][T20675]  ? memset+0x1f/0x40
[  533.986843][T20675]  ? fsnotify+0x1332/0x13f0
[  533.991332][T20675]  ? sock_poll+0x2f0/0x2f0
[  533.995883][T20675]  do_vfs_ioctl+0x76a/0x1720
[  534.000546][T20675]  ? selinux_file_ioctl+0x72f/0x990
[  534.005730][T20675]  ? ioctl_preallocate+0x250/0x250
[  534.010822][T20675]  ? __fget+0x37b/0x3c0
[  534.014971][T20675]  ? vfs_write+0x422/0x4e0
[  534.019384][T20675]  ? fget_many+0x20/0x20
[  534.023602][T20675]  ? debug_smp_processor_id+0x20/0x20
[  534.028953][T20675]  ? security_file_ioctl+0x9d/0xb0
[  534.034052][T20675]  __x64_sys_ioctl+0xd4/0x110
[  534.038712][T20675]  do_syscall_64+0xcb/0x1e0
[  534.043202][T20675]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  534.049078][T20675] RIP: 0033:0x466459
[  534.053089][T20675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  534.072908][T20675] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
21:32:19 executing program 0 (fault-call:8 fault-nth:48):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  534.081300][T20675] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  534.089257][T20675] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  534.097206][T20675] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  534.105165][T20675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  534.113130][T20675] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  534.140977][T20681] FAULT_INJECTION: forcing a failure.
[  534.140977][T20681] name failslab, interval 1, probability 0, space 0, times 0
[  534.154784][T20681] CPU: 0 PID: 20681 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  534.165037][T20681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  534.175081][T20681] Call Trace:
[  534.178368][T20681]  dump_stack+0x1d8/0x24e
[  534.182683][T20681]  ? devkmsg_release+0x11c/0x11c
[  534.187598][T20681]  ? mutex_unlock+0x19/0x40
[  534.192076][T20681]  ? show_regs_print_info+0x12/0x12
[  534.197251][T20681]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  534.203318][T20681]  should_fail+0x6f6/0x860
[  534.207707][T20681]  ? setup_fault_attr+0x3d0/0x3d0
[  534.212703][T20681]  ? _raw_spin_lock+0xa3/0x1b0
[  534.217441][T20681]  ? __kernfs_new_node+0xdb/0x6d0
[  534.222439][T20681]  should_failslab+0x5/0x20
[  534.226920][T20681]  kmem_cache_alloc+0x36/0x290
[  534.231661][T20681]  __kernfs_new_node+0xdb/0x6d0
[  534.236485][T20681]  ? mutex_lock+0xa6/0x110
[  534.240891][T20681]  ? kernfs_new_node+0x160/0x160
[  534.245819][T20681]  ? security_kernfs_init_security+0x9a/0xb0
[  534.251774][T20681]  ? kernfs_activate+0x3fc/0x420
[  534.256692][T20681]  kernfs_new_node+0x95/0x160
[  534.261343][T20681]  __kernfs_create_file+0x45/0x260
[  534.266431][T20681]  sysfs_add_file_mode_ns+0x293/0x340
[  534.271778][T20681]  internal_create_group+0x560/0xf10
[  534.277037][T20681]  ? sysfs_create_group+0x20/0x20
[  534.282035][T20681]  sysfs_create_groups+0x5d/0x130
[  534.287035][T20681]  device_add+0xae5/0x18a0
[  534.291440][T20681]  ? get_device+0x30/0x30
[  534.295744][T20681]  ? virtual_device_parent+0x50/0x50
[  534.301001][T20681]  ? pm_runtime_init+0x206/0x320
[  534.305926][T20681]  ? device_initialize+0x1d3/0x3e0
[  534.311013][T20681]  netdev_register_kobject+0x178/0x310
[  534.316447][T20681]  ? raw_notifier_call_chain+0xf2/0x110
[  534.321968][T20681]  register_netdevice+0xbc7/0x1480
[  534.327055][T20681]  ? netdev_update_lockdep_key+0x10/0x10
[  534.332664][T20681]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  534.337687][T20681]  ? __rcu_read_lock+0x50/0x50
[  534.344082][T20681]  ? alloc_netdev_mqs+0xa0c/0xc60
[  534.349083][T20681]  ? vti6_locate+0x551/0x910
[  534.353663][T20681]  vti6_locate+0x610/0x910
[  534.358056][T20681]  ? cap_capable+0x23f/0x280
[  534.362620][T20681]  ? vti6_link_config+0x530/0x530
[  534.367617][T20681]  ? vti6_ioctl+0xa64/0x1b10
[  534.372274][T20681]  vti6_ioctl+0xa88/0x1b10
[  534.376668][T20681]  ? vti6_tnl_xmit+0x1720/0x1720
[  534.381578][T20681]  ? __rcu_read_lock+0x50/0x50
[  534.386318][T20681]  ? check_preemption_disabled+0x154/0x330
[  534.392099][T20681]  ? avc_has_extended_perms+0xb5e/0x1140
[  534.397704][T20681]  ? full_name_hash+0xb4/0xe0
[  534.402354][T20681]  dev_ifsioc+0x675/0xa70
[  534.406658][T20681]  ? mutex_lock+0xa6/0x110
[  534.411048][T20681]  ? dev_ioctl+0xab0/0xab0
[  534.415436][T20681]  dev_ioctl+0x558/0xab0
[  534.419650][T20681]  sock_ioctl+0x677/0x760
[  534.423949][T20681]  ? sock_poll+0x2f0/0x2f0
[  534.428340][T20681]  ? memset+0x1f/0x40
[  534.432296][T20681]  ? fsnotify+0x1332/0x13f0
[  534.436770][T20681]  ? sock_poll+0x2f0/0x2f0
[  534.441160][T20681]  do_vfs_ioctl+0x76a/0x1720
[  534.446792][T20681]  ? selinux_file_ioctl+0x72f/0x990
[  534.451981][T20681]  ? ioctl_preallocate+0x250/0x250
[  534.457066][T20681]  ? __fget+0x37b/0x3c0
[  534.461195][T20681]  ? vfs_write+0x422/0x4e0
[  534.465584][T20681]  ? fget_many+0x20/0x20
[  534.469802][T20681]  ? debug_smp_processor_id+0x20/0x20
[  534.475181][T20681]  ? security_file_ioctl+0x9d/0xb0
[  534.480265][T20681]  __x64_sys_ioctl+0xd4/0x110
[  534.484919][T20681]  do_syscall_64+0xcb/0x1e0
[  534.489395][T20681]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  534.495262][T20681] RIP: 0033:0x466459
[  534.499132][T20681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  534.518707][T20681] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  534.527090][T20681] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  534.535036][T20681] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:19 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x5], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  534.542983][T20681] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  534.550927][T20681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  534.558887][T20681] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:19 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x14}, @mcast2}})

21:32:19 executing program 0 (fault-call:8 fault-nth:49):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  534.588673][T20686] x_tables: duplicate underflow at hook 2
[  534.601194][T20677] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  534.622073][T20689] EXT4-fs (loop1): Can't read superblock on 2nd try
[  534.632897][T20695] x_tables: duplicate underflow at hook 2
[  534.647248][T20698] FAULT_INJECTION: forcing a failure.
[  534.647248][T20698] name failslab, interval 1, probability 0, space 0, times 0
[  534.662125][T20698] CPU: 0 PID: 20698 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  534.672374][T20698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  534.682416][T20698] Call Trace:
[  534.685690][T20698]  dump_stack+0x1d8/0x24e
[  534.690004][T20698]  ? devkmsg_release+0x11c/0x11c
[  534.694921][T20698]  ? mutex_unlock+0x19/0x40
[  534.699403][T20698]  ? show_regs_print_info+0x12/0x12
[  534.704577][T20698]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  534.710632][T20698]  should_fail+0x6f6/0x860
[  534.715022][T20698]  ? setup_fault_attr+0x3d0/0x3d0
[  534.720026][T20698]  ? _raw_spin_lock+0xa3/0x1b0
[  534.724763][T20698]  ? __kernfs_new_node+0xdb/0x6d0
[  534.729761][T20698]  should_failslab+0x5/0x20
[  534.734240][T20698]  kmem_cache_alloc+0x36/0x290
[  534.738989][T20698]  __kernfs_new_node+0xdb/0x6d0
[  534.743819][T20698]  ? mutex_lock+0xa6/0x110
[  534.748227][T20698]  ? kernfs_new_node+0x160/0x160
[  534.753142][T20698]  ? security_kernfs_init_security+0x9a/0xb0
[  534.759115][T20698]  ? kernfs_activate+0x3fc/0x420
[  534.764043][T20698]  kernfs_new_node+0x95/0x160
[  534.768705][T20698]  __kernfs_create_file+0x45/0x260
[  534.773802][T20698]  sysfs_add_file_mode_ns+0x293/0x340
[  534.779148][T20698]  internal_create_group+0x560/0xf10
[  534.784408][T20698]  ? sysfs_create_group+0x20/0x20
[  534.789407][T20698]  sysfs_create_groups+0x5d/0x130
[  534.794413][T20698]  device_add+0xae5/0x18a0
[  534.798806][T20698]  ? get_device+0x30/0x30
[  534.803117][T20698]  ? virtual_device_parent+0x50/0x50
[  534.808377][T20698]  ? pm_runtime_init+0x206/0x320
[  534.813305][T20698]  ? device_initialize+0x1d3/0x3e0
[  534.818396][T20698]  netdev_register_kobject+0x178/0x310
[  534.823833][T20698]  ? raw_notifier_call_chain+0xf2/0x110
[  534.829358][T20698]  register_netdevice+0xbc7/0x1480
[  534.834451][T20698]  ? netdev_update_lockdep_key+0x10/0x10
[  534.840055][T20698]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  534.845073][T20698]  ? __rcu_read_lock+0x50/0x50
[  534.849820][T20698]  ? alloc_netdev_mqs+0xa0c/0xc60
[  534.854815][T20698]  ? vti6_locate+0x551/0x910
[  534.859381][T20698]  vti6_locate+0x610/0x910
[  534.863776][T20698]  ? cap_capable+0x23f/0x280
[  534.868343][T20698]  ? vti6_link_config+0x530/0x530
[  534.873343][T20698]  ? vti6_ioctl+0xa64/0x1b10
[  534.877906][T20698]  vti6_ioctl+0xa88/0x1b10
[  534.882297][T20698]  ? vti6_tnl_xmit+0x1720/0x1720
[  534.887210][T20698]  ? avc_has_extended_perms+0xb5e/0x1140
[  534.892816][T20698]  ? full_name_hash+0xb4/0xe0
[  534.897468][T20698]  dev_ifsioc+0x675/0xa70
[  534.901782][T20698]  ? mutex_lock+0x106/0x110
[  534.906278][T20698]  ? dev_ioctl+0xab0/0xab0
[  534.910731][T20698]  dev_ioctl+0x558/0xab0
[  534.914952][T20698]  sock_ioctl+0x677/0x760
[  534.919258][T20698]  ? sock_poll+0x2f0/0x2f0
[  534.923651][T20698]  ? memset+0x1f/0x40
[  534.927606][T20698]  ? fsnotify+0x1332/0x13f0
[  534.932084][T20698]  ? sock_poll+0x2f0/0x2f0
[  534.936758][T20698]  do_vfs_ioctl+0x76a/0x1720
[  534.941340][T20698]  ? selinux_file_ioctl+0x72f/0x990
[  534.946532][T20698]  ? ioctl_preallocate+0x250/0x250
[  534.951627][T20698]  ? __fget+0x37b/0x3c0
[  534.955758][T20698]  ? vfs_write+0x422/0x4e0
[  534.960156][T20698]  ? fget_many+0x20/0x20
[  534.964381][T20698]  ? debug_smp_processor_id+0x20/0x20
[  534.969751][T20698]  ? security_file_ioctl+0x9d/0xb0
[  534.974857][T20698]  __x64_sys_ioctl+0xd4/0x110
[  534.979509][T20698]  do_syscall_64+0xcb/0x1e0
[  534.984004][T20698]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  534.989869][T20698] RIP: 0033:0x466459
[  534.993752][T20698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  535.013330][T20698] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  535.021713][T20698] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  535.029675][T20698] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  535.037623][T20698] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  535.045569][T20698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  535.053516][T20698] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:20 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006c00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:20 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfe03], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:20 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:20 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:20 executing program 0 (fault-call:8 fault-nth:50):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:20 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x4b}, @mcast2}})

21:32:20 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x1fd74], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:20 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x40000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  535.164609][T20707] x_tables: duplicate underflow at hook 2
[  535.170820][T20708] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  535.174683][T20710] FAULT_INJECTION: forcing a failure.
[  535.174683][T20710] name failslab, interval 1, probability 0, space 0, times 0
[  535.203848][T20711] EXT4-fs (loop1): Can't read superblock on 2nd try
[  535.210874][T20710] CPU: 1 PID: 20710 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  535.221108][T20710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  535.231159][T20710] Call Trace:
[  535.234653][T20710]  dump_stack+0x1d8/0x24e
[  535.238968][T20710]  ? devkmsg_release+0x11c/0x11c
[  535.243931][T20710]  ? mutex_unlock+0x19/0x40
[  535.248411][T20710]  ? show_regs_print_info+0x12/0x12
[  535.253625][T20710]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  535.259678][T20710]  should_fail+0x6f6/0x860
[  535.264089][T20710]  ? setup_fault_attr+0x3d0/0x3d0
[  535.269098][T20710]  ? _raw_spin_lock+0xa3/0x1b0
[  535.273846][T20710]  ? __kernfs_new_node+0xdb/0x6d0
[  535.278846][T20710]  should_failslab+0x5/0x20
[  535.283329][T20710]  kmem_cache_alloc+0x36/0x290
[  535.288070][T20710]  __kernfs_new_node+0xdb/0x6d0
[  535.292997][T20710]  ? mutex_lock+0xa6/0x110
[  535.297387][T20710]  ? kernfs_new_node+0x160/0x160
[  535.302300][T20710]  ? security_kernfs_init_security+0x9a/0xb0
[  535.308255][T20710]  ? kernfs_activate+0x3fc/0x420
[  535.313167][T20710]  kernfs_new_node+0x95/0x160
[  535.317925][T20710]  __kernfs_create_file+0x45/0x260
[  535.323009][T20710]  sysfs_add_file_mode_ns+0x293/0x340
[  535.328355][T20710]  internal_create_group+0x560/0xf10
[  535.333636][T20710]  ? sysfs_create_group+0x20/0x20
[  535.338643][T20710]  sysfs_create_groups+0x5d/0x130
[  535.343665][T20710]  device_add+0xae5/0x18a0
[  535.348055][T20710]  ? get_device+0x30/0x30
[  535.352358][T20710]  ? virtual_device_parent+0x50/0x50
[  535.357618][T20710]  ? pm_runtime_init+0x206/0x320
[  535.362528][T20710]  ? device_initialize+0x1d3/0x3e0
[  535.367630][T20710]  netdev_register_kobject+0x178/0x310
[  535.373072][T20710]  ? raw_notifier_call_chain+0xf2/0x110
[  535.378608][T20710]  register_netdevice+0xbc7/0x1480
[  535.383717][T20710]  ? netdev_update_lockdep_key+0x10/0x10
[  535.389325][T20710]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  535.394330][T20710]  ? __rcu_read_lock+0x50/0x50
[  535.399092][T20710]  ? alloc_netdev_mqs+0xa0c/0xc60
[  535.404095][T20710]  ? vti6_locate+0x551/0x910
[  535.408664][T20710]  vti6_locate+0x610/0x910
[  535.413057][T20710]  ? cap_capable+0x23f/0x280
[  535.417618][T20710]  ? vti6_link_config+0x530/0x530
[  535.422624][T20710]  ? vti6_ioctl+0xa64/0x1b10
[  535.427239][T20710]  vti6_ioctl+0xa88/0x1b10
[  535.431702][T20710]  ? vti6_tnl_xmit+0x1720/0x1720
[  535.436636][T20710]  ? __rcu_read_lock+0x50/0x50
[  535.441391][T20710]  ? check_preemption_disabled+0x154/0x330
[  535.447178][T20710]  ? avc_has_extended_perms+0xb5e/0x1140
[  535.452790][T20710]  ? full_name_hash+0xb4/0xe0
[  535.457460][T20710]  dev_ifsioc+0x675/0xa70
[  535.461769][T20710]  ? mutex_lock+0xa6/0x110
[  535.466174][T20710]  ? dev_ioctl+0xab0/0xab0
[  535.470569][T20710]  dev_ioctl+0x558/0xab0
[  535.474797][T20710]  sock_ioctl+0x677/0x760
[  535.479107][T20710]  ? sock_poll+0x2f0/0x2f0
[  535.483502][T20710]  ? memset+0x1f/0x40
[  535.487469][T20710]  ? fsnotify+0x1332/0x13f0
[  535.491954][T20710]  ? sock_poll+0x2f0/0x2f0
[  535.496355][T20710]  do_vfs_ioctl+0x76a/0x1720
[  535.500937][T20710]  ? selinux_file_ioctl+0x72f/0x990
[  535.506117][T20710]  ? ioctl_preallocate+0x250/0x250
[  535.511207][T20710]  ? __fget+0x37b/0x3c0
[  535.515514][T20710]  ? vfs_write+0x422/0x4e0
[  535.519925][T20710]  ? fget_many+0x20/0x20
[  535.524159][T20710]  ? debug_smp_processor_id+0x20/0x20
[  535.529512][T20710]  ? security_file_ioctl+0x9d/0xb0
[  535.534611][T20710]  __x64_sys_ioctl+0xd4/0x110
[  535.539280][T20710]  do_syscall_64+0xcb/0x1e0
[  535.543782][T20710]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  535.549664][T20710] RIP: 0033:0x466459
21:32:20 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:20 executing program 0 (fault-call:8 fault-nth:51):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  535.553532][T20710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  535.573198][T20710] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  535.581584][T20710] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  535.589533][T20710] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  535.597498][T20710] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  535.605442][T20710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:32:20 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

[  535.613396][T20710] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  535.649099][T20723] FAULT_INJECTION: forcing a failure.
[  535.649099][T20723] name failslab, interval 1, probability 0, space 0, times 0
[  535.662366][T20723] CPU: 1 PID: 20723 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  535.672598][T20723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  535.682650][T20723] Call Trace:
[  535.685940][T20723]  dump_stack+0x1d8/0x24e
[  535.690248][T20723]  ? devkmsg_release+0x11c/0x11c
[  535.695194][T20723]  ? mutex_unlock+0x19/0x40
[  535.699673][T20723]  ? show_regs_print_info+0x12/0x12
[  535.704845][T20723]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  535.710887][T20723]  should_fail+0x6f6/0x860
[  535.715276][T20723]  ? setup_fault_attr+0x3d0/0x3d0
[  535.720293][T20723]  ? _raw_spin_lock+0xa3/0x1b0
[  535.725031][T20723]  ? __kernfs_new_node+0xdb/0x6d0
[  535.730043][T20723]  should_failslab+0x5/0x20
[  535.734519][T20723]  kmem_cache_alloc+0x36/0x290
[  535.739257][T20723]  __kernfs_new_node+0xdb/0x6d0
[  535.744084][T20723]  ? mutex_lock+0xa6/0x110
[  535.748472][T20723]  ? kernfs_new_node+0x160/0x160
[  535.753401][T20723]  ? security_kernfs_init_security+0x9a/0xb0
[  535.759355][T20723]  ? kernfs_activate+0x3fc/0x420
[  535.764264][T20723]  kernfs_new_node+0x95/0x160
[  535.768915][T20723]  __kernfs_create_file+0x45/0x260
[  535.774025][T20723]  sysfs_add_file_mode_ns+0x293/0x340
[  535.779369][T20723]  internal_create_group+0x560/0xf10
[  535.784630][T20723]  ? sysfs_create_group+0x20/0x20
[  535.789636][T20723]  sysfs_create_groups+0x5d/0x130
[  535.794638][T20723]  device_add+0xae5/0x18a0
[  535.799055][T20723]  ? get_device+0x30/0x30
[  535.803359][T20723]  ? virtual_device_parent+0x50/0x50
[  535.808629][T20723]  ? pm_runtime_init+0x206/0x320
[  535.813539][T20723]  ? device_initialize+0x1d3/0x3e0
[  535.818627][T20723]  netdev_register_kobject+0x178/0x310
[  535.824061][T20723]  ? raw_notifier_call_chain+0xf2/0x110
[  535.829581][T20723]  register_netdevice+0xbc7/0x1480
[  535.834798][T20723]  ? netdev_update_lockdep_key+0x10/0x10
[  535.840521][T20723]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  535.845530][T20723]  ? __rcu_read_lock+0x50/0x50
[  535.850427][T20723]  ? alloc_netdev_mqs+0xa0c/0xc60
[  535.855462][T20723]  ? vti6_locate+0x551/0x910
[  535.860033][T20723]  vti6_locate+0x610/0x910
[  535.864437][T20723]  ? cap_capable+0x23f/0x280
[  535.869005][T20723]  ? vti6_link_config+0x530/0x530
[  535.875354][T20723]  ? vti6_ioctl+0xa64/0x1b10
[  535.879918][T20723]  vti6_ioctl+0xa88/0x1b10
[  535.884311][T20723]  ? vti6_tnl_xmit+0x1720/0x1720
[  535.889222][T20723]  ? __rcu_read_lock+0x50/0x50
[  535.893964][T20723]  ? check_preemption_disabled+0x154/0x330
[  535.899745][T20723]  ? avc_has_extended_perms+0xb5e/0x1140
[  535.905377][T20723]  ? full_name_hash+0xb4/0xe0
[  535.910030][T20723]  dev_ifsioc+0x675/0xa70
[  535.914335][T20723]  ? mutex_lock+0xa6/0x110
[  535.918723][T20723]  ? dev_ioctl+0xab0/0xab0
[  535.923115][T20723]  dev_ioctl+0x558/0xab0
[  535.927350][T20723]  sock_ioctl+0x677/0x760
[  535.931669][T20723]  ? sock_poll+0x2f0/0x2f0
[  535.936058][T20723]  ? memset+0x1f/0x40
[  535.940015][T20723]  ? fsnotify+0x1332/0x13f0
[  535.944490][T20723]  ? sock_poll+0x2f0/0x2f0
[  535.948878][T20723]  do_vfs_ioctl+0x76a/0x1720
[  535.953441][T20723]  ? selinux_file_ioctl+0x72f/0x990
[  535.958625][T20723]  ? ioctl_preallocate+0x250/0x250
[  535.963715][T20723]  ? __fget+0x37b/0x3c0
[  535.967851][T20723]  ? vfs_write+0x422/0x4e0
[  535.972243][T20723]  ? fget_many+0x20/0x20
[  535.976464][T20723]  ? debug_smp_processor_id+0x20/0x20
[  535.981825][T20723]  ? security_file_ioctl+0x9d/0xb0
[  535.986908][T20723]  __x64_sys_ioctl+0xd4/0x110
[  535.991559][T20723]  do_syscall_64+0xcb/0x1e0
[  535.996049][T20723]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  536.001932][T20723] RIP: 0033:0x466459
[  536.005821][T20723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  536.025414][T20723] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  536.033797][T20723] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  536.041746][T20723] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:21 executing program 0 (fault-call:8 fault-nth:52):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:21 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019007400900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:21 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x64}, @mcast2}})

[  536.049699][T20723] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  536.057644][T20723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  536.065592][T20723] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:21 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  536.130634][T20735] x_tables: duplicate underflow at hook 2
[  536.139400][T20734] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  536.140272][T20726] FAULT_INJECTION: forcing a failure.
[  536.140272][T20726] name failslab, interval 1, probability 0, space 0, times 0
[  536.164198][T20739] EXT4-fs (loop1): Can't read superblock on 2nd try
[  536.169526][T20726] CPU: 1 PID: 20726 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  536.181152][T20726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  536.191188][T20726] Call Trace:
[  536.194463][T20726]  dump_stack+0x1d8/0x24e
[  536.198777][T20726]  ? devkmsg_release+0x11c/0x11c
[  536.203701][T20726]  ? mutex_unlock+0x19/0x40
[  536.208203][T20726]  ? show_regs_print_info+0x12/0x12
[  536.213379][T20726]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  536.219423][T20726]  should_fail+0x6f6/0x860
[  536.223849][T20726]  ? setup_fault_attr+0x3d0/0x3d0
[  536.228851][T20726]  ? _raw_spin_lock+0xa3/0x1b0
[  536.233587][T20726]  ? __kernfs_new_node+0xdb/0x6d0
[  536.238584][T20726]  should_failslab+0x5/0x20
[  536.243062][T20726]  kmem_cache_alloc+0x36/0x290
[  536.247821][T20726]  __kernfs_new_node+0xdb/0x6d0
[  536.252648][T20726]  ? mutex_lock+0xa6/0x110
[  536.257039][T20726]  ? kernfs_new_node+0x160/0x160
[  536.261970][T20726]  ? security_kernfs_init_security+0x9a/0xb0
[  536.267928][T20726]  ? kernfs_activate+0x3fc/0x420
[  536.272841][T20726]  kernfs_new_node+0x95/0x160
[  536.277494][T20726]  __kernfs_create_file+0x45/0x260
[  536.282581][T20726]  sysfs_add_file_mode_ns+0x293/0x340
[  536.287949][T20726]  internal_create_group+0x560/0xf10
[  536.293208][T20726]  ? sysfs_create_group+0x20/0x20
[  536.298208][T20726]  sysfs_create_groups+0x5d/0x130
[  536.303207][T20726]  device_add+0xae5/0x18a0
[  536.307628][T20726]  ? get_device+0x30/0x30
[  536.311930][T20726]  ? virtual_device_parent+0x50/0x50
[  536.317190][T20726]  ? pm_runtime_init+0x206/0x320
[  536.322120][T20726]  ? device_initialize+0x1d3/0x3e0
[  536.327205][T20726]  netdev_register_kobject+0x178/0x310
[  536.332643][T20726]  ? raw_notifier_call_chain+0xf2/0x110
[  536.338190][T20726]  register_netdevice+0xbc7/0x1480
[  536.343279][T20726]  ? netdev_update_lockdep_key+0x10/0x10
[  536.348887][T20726]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  536.353888][T20726]  ? __rcu_read_lock+0x50/0x50
[  536.358628][T20726]  ? alloc_netdev_mqs+0xa0c/0xc60
[  536.363635][T20726]  ? vti6_locate+0x551/0x910
[  536.368201][T20726]  vti6_locate+0x610/0x910
[  536.372617][T20726]  ? cap_capable+0x23f/0x280
[  536.377624][T20726]  ? vti6_link_config+0x530/0x530
[  536.382634][T20726]  ? vti6_ioctl+0xa64/0x1b10
[  536.387199][T20726]  vti6_ioctl+0xa88/0x1b10
[  536.391595][T20726]  ? vti6_tnl_xmit+0x1720/0x1720
[  536.396526][T20726]  ? __rcu_read_lock+0x50/0x50
[  536.401267][T20726]  ? check_preemption_disabled+0x154/0x330
[  536.407112][T20726]  ? avc_has_extended_perms+0xb5e/0x1140
[  536.412717][T20726]  ? full_name_hash+0xb4/0xe0
[  536.417369][T20726]  dev_ifsioc+0x675/0xa70
[  536.421693][T20726]  ? mutex_lock+0xa6/0x110
[  536.426081][T20726]  ? dev_ioctl+0xab0/0xab0
[  536.430481][T20726]  dev_ioctl+0x558/0xab0
[  536.434698][T20726]  sock_ioctl+0x677/0x760
[  536.439002][T20726]  ? sock_poll+0x2f0/0x2f0
[  536.443390][T20726]  ? memset+0x1f/0x40
[  536.447343][T20726]  ? fsnotify+0x1332/0x13f0
[  536.451819][T20726]  ? sock_poll+0x2f0/0x2f0
[  536.456220][T20726]  do_vfs_ioctl+0x76a/0x1720
[  536.460793][T20726]  ? selinux_file_ioctl+0x72f/0x990
[  536.465975][T20726]  ? ioctl_preallocate+0x250/0x250
[  536.471076][T20726]  ? __fget+0x37b/0x3c0
[  536.475278][T20726]  ? vfs_write+0x422/0x4e0
[  536.479688][T20726]  ? fget_many+0x20/0x20
[  536.483911][T20726]  ? debug_smp_processor_id+0x20/0x20
[  536.489260][T20726]  ? security_file_ioctl+0x9d/0xb0
[  536.494356][T20726]  __x64_sys_ioctl+0xd4/0x110
[  536.499018][T20726]  do_syscall_64+0xcb/0x1e0
[  536.503524][T20726]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  536.509391][T20726] RIP: 0033:0x466459
21:32:21 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x1000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:21 executing program 0 (fault-call:8 fault-nth:53):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  536.513278][T20726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  536.532854][T20726] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  536.541241][T20726] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  536.551981][T20726] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  536.560104][T20726] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  536.568056][T20726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:32:21 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:21 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019007a00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  536.576008][T20726] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:21 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x9], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:21 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x2000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  536.624963][T20748] secmark_tg_check: 11 callbacks suppressed
[  536.624968][T20748] xt_SECMARK: invalid mode: 0
[  536.631836][T20751] x_tables: duplicate underflow at hook 2
[  536.646926][T20753] xt_SECMARK: invalid mode: 0
[  536.651974][T20752] FAULT_INJECTION: forcing a failure.
[  536.651974][T20752] name failslab, interval 1, probability 0, space 0, times 0
[  536.665819][T20752] CPU: 1 PID: 20752 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  536.676064][T20752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  536.680215][T20759] x_tables: duplicate underflow at hook 2
[  536.686198][T20752] Call Trace:
[  536.686222][T20752]  dump_stack+0x1d8/0x24e
[  536.686234][T20752]  ? devkmsg_release+0x11c/0x11c
[  536.686250][T20752]  ? mutex_unlock+0x19/0x40
[  536.708963][T20752]  ? show_regs_print_info+0x12/0x12
[  536.714158][T20752]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  536.720297][T20752]  should_fail+0x6f6/0x860
[  536.724693][T20752]  ? setup_fault_attr+0x3d0/0x3d0
[  536.729703][T20752]  ? _raw_spin_lock+0xa3/0x1b0
[  536.734453][T20752]  ? __kernfs_new_node+0xdb/0x6d0
[  536.739450][T20752]  should_failslab+0x5/0x20
[  536.743929][T20752]  kmem_cache_alloc+0x36/0x290
[  536.748668][T20752]  __kernfs_new_node+0xdb/0x6d0
[  536.753494][T20752]  ? mutex_lock+0xa6/0x110
[  536.757882][T20752]  ? kernfs_new_node+0x160/0x160
[  536.762794][T20752]  ? security_kernfs_init_security+0x9a/0xb0
[  536.768761][T20752]  ? kernfs_activate+0x3fc/0x420
[  536.773670][T20752]  kernfs_new_node+0x95/0x160
[  536.778319][T20752]  __kernfs_create_file+0x45/0x260
[  536.783404][T20752]  sysfs_add_file_mode_ns+0x293/0x340
[  536.788749][T20752]  internal_create_group+0x560/0xf10
[  536.794025][T20752]  ? sysfs_create_group+0x20/0x20
[  536.799042][T20752]  sysfs_create_groups+0x5d/0x130
[  536.804058][T20752]  device_add+0xae5/0x18a0
[  536.808452][T20752]  ? get_device+0x30/0x30
[  536.812754][T20752]  ? virtual_device_parent+0x50/0x50
[  536.818009][T20752]  ? pm_runtime_init+0x206/0x320
[  536.822917][T20752]  ? device_initialize+0x1d3/0x3e0
[  536.828001][T20752]  netdev_register_kobject+0x178/0x310
[  536.833433][T20752]  ? raw_notifier_call_chain+0xf2/0x110
[  536.838949][T20752]  register_netdevice+0xbc7/0x1480
[  536.844036][T20752]  ? netdev_update_lockdep_key+0x10/0x10
[  536.849648][T20752]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  536.854647][T20752]  ? __rcu_read_lock+0x50/0x50
[  536.859381][T20752]  ? alloc_netdev_mqs+0xa0c/0xc60
[  536.864378][T20752]  ? vti6_locate+0x551/0x910
[  536.868939][T20752]  vti6_locate+0x610/0x910
[  536.873330][T20752]  ? cap_capable+0x23f/0x280
[  536.877891][T20752]  ? vti6_link_config+0x530/0x530
[  536.882886][T20752]  ? vti6_ioctl+0xa64/0x1b10
[  536.887446][T20752]  vti6_ioctl+0xa88/0x1b10
[  536.891853][T20752]  ? vti6_tnl_xmit+0x1720/0x1720
[  536.896765][T20752]  ? __rcu_read_lock+0x50/0x50
[  536.901500][T20752]  ? check_preemption_disabled+0x154/0x330
[  536.907421][T20752]  ? avc_has_extended_perms+0xb5e/0x1140
[  536.913034][T20752]  ? full_name_hash+0xb4/0xe0
[  536.917685][T20752]  dev_ifsioc+0x675/0xa70
[  536.921988][T20752]  ? mutex_lock+0xa6/0x110
[  536.926375][T20752]  ? dev_ioctl+0xab0/0xab0
[  536.930764][T20752]  dev_ioctl+0x558/0xab0
[  536.934980][T20752]  sock_ioctl+0x677/0x760
[  536.939280][T20752]  ? sock_poll+0x2f0/0x2f0
[  536.943677][T20752]  ? memset+0x1f/0x40
[  536.947629][T20752]  ? fsnotify+0x1332/0x13f0
[  536.952103][T20752]  ? sock_poll+0x2f0/0x2f0
[  536.956491][T20752]  do_vfs_ioctl+0x76a/0x1720
[  536.961055][T20752]  ? selinux_file_ioctl+0x72f/0x990
[  536.966227][T20752]  ? ioctl_preallocate+0x250/0x250
[  536.971311][T20752]  ? __fget+0x37b/0x3c0
[  536.975438][T20752]  ? vfs_write+0x422/0x4e0
[  536.979826][T20752]  ? fget_many+0x20/0x20
[  536.984042][T20752]  ? debug_smp_processor_id+0x20/0x20
[  536.989390][T20752]  ? security_file_ioctl+0x9d/0xb0
[  536.994472][T20752]  __x64_sys_ioctl+0xd4/0x110
[  536.999124][T20752]  do_syscall_64+0xcb/0x1e0
[  537.003603][T20752]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  537.009467][T20752] RIP: 0033:0x466459
21:32:22 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xa], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  537.013335][T20752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  537.032909][T20752] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  537.041292][T20752] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  537.049236][T20752] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  537.057296][T20752] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  537.065250][T20752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:32:22 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x3000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:22 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x71}, @mcast2}})

21:32:22 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xb], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:22 executing program 0 (fault-call:8 fault-nth:54):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  537.073198][T20752] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  537.091937][T20763] xt_SECMARK: invalid mode: 0
[  537.097004][T20756] EXT4-fs (loop1): Can't read superblock on 2nd try
[  537.104669][T20764] xt_SECMARK: invalid mode: 0
21:32:22 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xc], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  537.122953][T20750] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  537.138422][T20756] EXT4-fs (loop1): Can't read superblock on 2nd try
[  537.161359][T20774] FAULT_INJECTION: forcing a failure.
[  537.161359][T20774] name failslab, interval 1, probability 0, space 0, times 0
21:32:22 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x4000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  537.166181][T20775] xt_SECMARK: invalid mode: 0
[  537.181634][T20774] CPU: 0 PID: 20774 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  537.183006][T20777] xt_SECMARK: invalid mode: 0
[  537.191890][T20774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  537.191894][T20774] Call Trace:
[  537.191920][T20774]  dump_stack+0x1d8/0x24e
[  537.191933][T20774]  ? devkmsg_release+0x11c/0x11c
[  537.191941][T20774]  ? mutex_unlock+0x19/0x40
[  537.191948][T20774]  ? show_regs_print_info+0x12/0x12
[  537.191957][T20774]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  537.191967][T20774]  should_fail+0x6f6/0x860
[  537.191975][T20774]  ? setup_fault_attr+0x3d0/0x3d0
[  537.191984][T20774]  ? _raw_spin_lock+0xa3/0x1b0
[  537.191992][T20774]  ? __kernfs_new_node+0xdb/0x6d0
[  537.192000][T20774]  should_failslab+0x5/0x20
[  537.192009][T20774]  kmem_cache_alloc+0x36/0x290
[  537.192021][T20774]  __kernfs_new_node+0xdb/0x6d0
[  537.192031][T20774]  ? mutex_lock+0xa6/0x110
[  537.192040][T20774]  ? kernfs_new_node+0x160/0x160
[  537.192050][T20774]  ? security_kernfs_init_security+0x9a/0xb0
[  537.192061][T20774]  ? kernfs_activate+0x3fc/0x420
[  537.192070][T20774]  kernfs_new_node+0x95/0x160
[  537.192085][T20774]  __kernfs_create_file+0x45/0x260
[  537.298058][T20774]  sysfs_add_file_mode_ns+0x293/0x340
[  537.303424][T20774]  internal_create_group+0x560/0xf10
[  537.308685][T20774]  ? sysfs_create_group+0x20/0x20
[  537.313704][T20774]  sysfs_create_groups+0x5d/0x130
[  537.318709][T20774]  device_add+0xae5/0x18a0
[  537.323185][T20774]  ? get_device+0x30/0x30
[  537.327489][T20774]  ? virtual_device_parent+0x50/0x50
[  537.332748][T20774]  ? pm_runtime_init+0x206/0x320
[  537.337677][T20774]  ? device_initialize+0x1d3/0x3e0
[  537.342767][T20774]  netdev_register_kobject+0x178/0x310
[  537.348202][T20774]  ? raw_notifier_call_chain+0xf2/0x110
[  537.353722][T20774]  register_netdevice+0xbc7/0x1480
[  537.358831][T20774]  ? netdev_update_lockdep_key+0x10/0x10
[  537.364453][T20774]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  537.369459][T20774]  ? __rcu_read_lock+0x50/0x50
[  537.374208][T20774]  ? alloc_netdev_mqs+0xa0c/0xc60
[  537.379208][T20774]  ? vti6_locate+0x551/0x910
[  537.383774][T20774]  vti6_locate+0x610/0x910
[  537.388169][T20774]  ? cap_capable+0x23f/0x280
[  537.392843][T20774]  ? vti6_link_config+0x530/0x530
[  537.397853][T20774]  ? vti6_ioctl+0xa64/0x1b10
[  537.402427][T20774]  vti6_ioctl+0xa88/0x1b10
[  537.406822][T20774]  ? vti6_tnl_xmit+0x1720/0x1720
[  537.411739][T20774]  ? __rcu_read_lock+0x50/0x50
[  537.416501][T20774]  ? check_preemption_disabled+0x154/0x330
[  537.422315][T20774]  ? avc_has_extended_perms+0xb5e/0x1140
[  537.427925][T20774]  ? full_name_hash+0xb4/0xe0
[  537.432581][T20774]  dev_ifsioc+0x675/0xa70
[  537.436891][T20774]  ? mutex_lock+0xa6/0x110
[  537.441285][T20774]  ? dev_ioctl+0xab0/0xab0
[  537.445678][T20774]  dev_ioctl+0x558/0xab0
[  537.449920][T20774]  sock_ioctl+0x677/0x760
[  537.454233][T20774]  ? sock_poll+0x2f0/0x2f0
[  537.458849][T20774]  ? __perf_event_task_sched_in+0x57c/0x5e0
[  537.464751][T20774]  ? sock_poll+0x2f0/0x2f0
[  537.469149][T20774]  do_vfs_ioctl+0x76a/0x1720
[  537.473723][T20774]  ? selinux_file_ioctl+0x72f/0x990
[  537.478900][T20774]  ? ioctl_preallocate+0x250/0x250
[  537.483996][T20774]  ? _raw_spin_unlock_irq+0x4a/0x60
[  537.489183][T20774]  ? finish_task_switch+0x130/0x550
[  537.494359][T20774]  ? __fget+0x37b/0x3c0
[  537.498494][T20774]  ? debug_smp_processor_id+0x20/0x20
[  537.503843][T20774]  ? fget_many+0x20/0x20
[  537.508061][T20774]  ? __fpregs_load_activate+0x1d7/0x3c0
[  537.513585][T20774]  ? security_file_ioctl+0x9d/0xb0
[  537.518678][T20774]  __x64_sys_ioctl+0xd4/0x110
[  537.523345][T20774]  do_syscall_64+0xcb/0x1e0
[  537.527829][T20774]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  537.533837][T20774] RIP: 0033:0x466459
[  537.537710][T20774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  537.557311][T20774] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  537.565724][T20774] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:22 executing program 0 (fault-call:8 fault-nth:55):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:22 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:22 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e300900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  537.573675][T20774] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  537.581625][T20774] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  537.589586][T20774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  537.597542][T20774] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:22 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x5000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  537.657491][T20785] xt_SECMARK: invalid mode: 0
[  537.657816][T20780] FAULT_INJECTION: forcing a failure.
[  537.657816][T20780] name failslab, interval 1, probability 0, space 0, times 0
[  537.663103][T20789] xt_SECMARK: invalid mode: 0
[  537.675580][T20780] CPU: 0 PID: 20780 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  537.686897][T20787] xt_check_table_hooks: 2 callbacks suppressed
[  537.686903][T20787] x_tables: duplicate underflow at hook 2
[  537.689853][T20780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  537.689857][T20780] Call Trace:
[  537.689877][T20780]  dump_stack+0x1d8/0x24e
[  537.689888][T20780]  ? devkmsg_release+0x11c/0x11c
[  537.689896][T20780]  ? mutex_unlock+0x19/0x40
[  537.689903][T20780]  ? show_regs_print_info+0x12/0x12
[  537.689920][T20780]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  537.739931][T20780]  should_fail+0x6f6/0x860
[  537.744344][T20780]  ? setup_fault_attr+0x3d0/0x3d0
[  537.749344][T20780]  ? _raw_spin_lock+0xa3/0x1b0
[  537.754096][T20780]  ? __kernfs_new_node+0xdb/0x6d0
[  537.759093][T20780]  should_failslab+0x5/0x20
[  537.763570][T20780]  kmem_cache_alloc+0x36/0x290
[  537.768307][T20780]  __kernfs_new_node+0xdb/0x6d0
[  537.773134][T20780]  ? mutex_lock+0xa6/0x110
[  537.777537][T20780]  ? kernfs_new_node+0x160/0x160
[  537.782450][T20780]  ? security_kernfs_init_security+0x9a/0xb0
[  537.788420][T20780]  ? kernfs_activate+0x3fc/0x420
[  537.793334][T20780]  kernfs_new_node+0x95/0x160
[  537.797984][T20780]  __kernfs_create_file+0x45/0x260
[  537.803073][T20780]  sysfs_add_file_mode_ns+0x293/0x340
[  537.808419][T20780]  internal_create_group+0x560/0xf10
[  537.813679][T20780]  ? sysfs_create_group+0x20/0x20
[  537.818676][T20780]  sysfs_create_groups+0x5d/0x130
[  537.823676][T20780]  device_add+0xae5/0x18a0
[  537.828065][T20780]  ? get_device+0x30/0x30
[  537.832374][T20780]  ? virtual_device_parent+0x50/0x50
[  537.837632][T20780]  ? pm_runtime_init+0x206/0x320
[  537.842540][T20780]  ? device_initialize+0x1d3/0x3e0
[  537.847624][T20780]  netdev_register_kobject+0x178/0x310
[  537.853058][T20780]  ? raw_notifier_call_chain+0xf2/0x110
[  537.858602][T20780]  register_netdevice+0xbc7/0x1480
[  537.863710][T20780]  ? netdev_update_lockdep_key+0x10/0x10
[  537.869320][T20780]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  537.874319][T20780]  ? __rcu_read_lock+0x50/0x50
[  537.879054][T20780]  ? alloc_netdev_mqs+0xa0c/0xc60
[  537.884053][T20780]  ? vti6_locate+0x551/0x910
[  537.888633][T20780]  vti6_locate+0x610/0x910
[  537.893025][T20780]  ? cap_capable+0x23f/0x280
[  537.897605][T20780]  ? vti6_link_config+0x530/0x530
[  537.902601][T20780]  ? vti6_ioctl+0xa64/0x1b10
[  537.907161][T20780]  vti6_ioctl+0xa88/0x1b10
[  537.911685][T20780]  ? vti6_tnl_xmit+0x1720/0x1720
[  537.916618][T20780]  ? __rcu_read_lock+0x50/0x50
[  537.921368][T20780]  ? check_preemption_disabled+0x154/0x330
[  537.927151][T20780]  ? avc_has_extended_perms+0xb5e/0x1140
[  537.932756][T20780]  ? full_name_hash+0xb4/0xe0
[  537.937494][T20780]  dev_ifsioc+0x675/0xa70
[  537.941802][T20780]  ? mutex_lock+0xa6/0x110
[  537.946189][T20780]  ? dev_ioctl+0xab0/0xab0
[  537.950581][T20780]  dev_ioctl+0x558/0xab0
[  537.954796][T20780]  sock_ioctl+0x677/0x760
[  537.959098][T20780]  ? sock_poll+0x2f0/0x2f0
[  537.963489][T20780]  ? memset+0x1f/0x40
[  537.967448][T20780]  ? fsnotify+0x1332/0x13f0
[  537.971924][T20780]  ? sock_poll+0x2f0/0x2f0
[  537.976315][T20780]  do_vfs_ioctl+0x76a/0x1720
[  537.980878][T20780]  ? selinux_file_ioctl+0x72f/0x990
[  537.986063][T20780]  ? ioctl_preallocate+0x250/0x250
[  537.991149][T20780]  ? __fget+0x37b/0x3c0
[  537.995277][T20780]  ? vfs_write+0x422/0x4e0
[  537.999666][T20780]  ? fget_many+0x20/0x20
[  538.003881][T20780]  ? debug_smp_processor_id+0x20/0x20
[  538.009224][T20780]  ? security_file_ioctl+0x9d/0xb0
[  538.014309][T20780]  __x64_sys_ioctl+0xd4/0x110
[  538.018961][T20780]  do_syscall_64+0xcb/0x1e0
[  538.023439][T20780]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  538.029304][T20780] RIP: 0033:0x466459
[  538.033175][T20780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
21:32:23 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xd], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:23 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x110}, @mcast2}})

21:32:23 executing program 0 (fault-call:8 fault-nth:56):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  538.052769][T20780] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  538.061158][T20780] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  538.069102][T20780] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  538.077045][T20780] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  538.085946][T20780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  538.093891][T20780] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  538.130919][T20788] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  538.146675][T20786] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:23 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x6000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  538.177233][T20795] xt_SECMARK: invalid mode: 0
[  538.178886][T20799] FAULT_INJECTION: forcing a failure.
[  538.178886][T20799] name failslab, interval 1, probability 0, space 0, times 0
[  538.182186][T20797] x_tables: duplicate underflow at hook 2
[  538.200548][T20799] CPU: 0 PID: 20799 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  538.210783][T20799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  538.220832][T20799] Call Trace:
[  538.224122][T20799]  dump_stack+0x1d8/0x24e
[  538.224347][T20802] xt_SECMARK: invalid mode: 0
[  538.228445][T20799]  ? devkmsg_release+0x11c/0x11c
[  538.228456][T20799]  ? mutex_unlock+0x19/0x40
[  538.228466][T20799]  ? show_regs_print_info+0x12/0x12
[  538.228482][T20799]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  538.253928][T20799]  should_fail+0x6f6/0x860
[  538.258332][T20799]  ? setup_fault_attr+0x3d0/0x3d0
[  538.263332][T20799]  ? _raw_spin_lock+0xa3/0x1b0
[  538.268097][T20799]  ? __kernfs_new_node+0xdb/0x6d0
[  538.273106][T20799]  should_failslab+0x5/0x20
[  538.277583][T20799]  kmem_cache_alloc+0x36/0x290
[  538.282330][T20799]  __kernfs_new_node+0xdb/0x6d0
[  538.287167][T20799]  ? mutex_lock+0xa6/0x110
[  538.291577][T20799]  ? kernfs_new_node+0x160/0x160
[  538.296494][T20799]  ? security_kernfs_init_security+0x9a/0xb0
[  538.302454][T20799]  ? kernfs_activate+0x3fc/0x420
[  538.307369][T20799]  kernfs_new_node+0x95/0x160
[  538.312023][T20799]  __kernfs_create_file+0x45/0x260
[  538.317114][T20799]  sysfs_add_file_mode_ns+0x293/0x340
[  538.322468][T20799]  internal_create_group+0x560/0xf10
[  538.327728][T20799]  ? sysfs_create_group+0x20/0x20
[  538.332726][T20799]  sysfs_create_groups+0x5d/0x130
[  538.337737][T20799]  device_add+0xae5/0x18a0
[  538.342136][T20799]  ? get_device+0x30/0x30
[  538.346520][T20799]  ? virtual_device_parent+0x50/0x50
[  538.351836][T20799]  ? pm_runtime_init+0x206/0x320
[  538.356756][T20799]  ? device_initialize+0x1d3/0x3e0
[  538.361847][T20799]  netdev_register_kobject+0x178/0x310
[  538.367284][T20799]  ? raw_notifier_call_chain+0xf2/0x110
[  538.372805][T20799]  register_netdevice+0xbc7/0x1480
[  538.377902][T20799]  ? netdev_update_lockdep_key+0x10/0x10
[  538.383522][T20799]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  538.388528][T20799]  ? __rcu_read_lock+0x50/0x50
[  538.393314][T20799]  ? alloc_netdev_mqs+0xa0c/0xc60
[  538.398318][T20799]  ? vti6_locate+0x551/0x910
[  538.402881][T20799]  vti6_locate+0x610/0x910
[  538.407282][T20799]  ? cap_capable+0x23f/0x280
[  538.411862][T20799]  ? vti6_link_config+0x530/0x530
[  538.416857][T20799]  ? vti6_ioctl+0xa64/0x1b10
[  538.421425][T20799]  vti6_ioctl+0xa88/0x1b10
[  538.425826][T20799]  ? vti6_tnl_xmit+0x1720/0x1720
[  538.430747][T20799]  ? __rcu_read_lock+0x50/0x50
[  538.435485][T20799]  ? check_preemption_disabled+0x154/0x330
[  538.441270][T20799]  ? avc_has_extended_perms+0xb5e/0x1140
[  538.446876][T20799]  ? full_name_hash+0xb4/0xe0
[  538.451526][T20799]  dev_ifsioc+0x675/0xa70
[  538.455831][T20799]  ? mutex_lock+0xa6/0x110
[  538.460241][T20799]  ? dev_ioctl+0xab0/0xab0
[  538.464632][T20799]  dev_ioctl+0x558/0xab0
[  538.468851][T20799]  sock_ioctl+0x677/0x760
[  538.473158][T20799]  ? sock_poll+0x2f0/0x2f0
[  538.477548][T20799]  ? memset+0x1f/0x40
[  538.481525][T20799]  ? fsnotify+0x1332/0x13f0
[  538.485999][T20799]  ? sock_poll+0x2f0/0x2f0
[  538.490393][T20799]  do_vfs_ioctl+0x76a/0x1720
[  538.494978][T20799]  ? selinux_file_ioctl+0x72f/0x990
[  538.500155][T20799]  ? ioctl_preallocate+0x250/0x250
[  538.505261][T20799]  ? __fget+0x37b/0x3c0
[  538.509418][T20799]  ? vfs_write+0x422/0x4e0
[  538.513808][T20799]  ? fget_many+0x20/0x20
[  538.518027][T20799]  ? debug_smp_processor_id+0x20/0x20
[  538.523376][T20799]  ? security_file_ioctl+0x9d/0xb0
[  538.528466][T20799]  __x64_sys_ioctl+0xd4/0x110
[  538.533118][T20799]  do_syscall_64+0xcb/0x1e0
[  538.537595][T20799]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  538.543458][T20799] RIP: 0033:0x466459
[  538.547324][T20799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  538.566900][T20799] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
21:32:23 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xe], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:23 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:23 executing program 0 (fault-call:8 fault-nth:57):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  538.575292][T20799] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  538.583247][T20799] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  538.591198][T20799] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  538.599144][T20799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  538.607092][T20799] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  538.639529][T20806] FAULT_INJECTION: forcing a failure.
[  538.639529][T20806] name failslab, interval 1, probability 0, space 0, times 0
[  538.652437][T20806] CPU: 1 PID: 20806 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  538.662899][T20806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  538.672936][T20806] Call Trace:
[  538.676343][T20806]  dump_stack+0x1d8/0x24e
[  538.680670][T20806]  ? devkmsg_release+0x11c/0x11c
[  538.685639][T20806]  ? mutex_unlock+0x19/0x40
[  538.690124][T20806]  ? show_regs_print_info+0x12/0x12
[  538.695362][T20806]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  538.701406][T20806]  should_fail+0x6f6/0x860
[  538.705810][T20806]  ? setup_fault_attr+0x3d0/0x3d0
[  538.710848][T20806]  ? _raw_spin_lock+0xa3/0x1b0
[  538.715610][T20806]  ? __kernfs_new_node+0xdb/0x6d0
[  538.720620][T20806]  should_failslab+0x5/0x20
[  538.725102][T20806]  kmem_cache_alloc+0x36/0x290
[  538.729842][T20806]  __kernfs_new_node+0xdb/0x6d0
[  538.734689][T20806]  ? mutex_lock+0xa6/0x110
[  538.739079][T20806]  ? kernfs_new_node+0x160/0x160
[  538.743993][T20806]  ? security_kernfs_init_security+0x9a/0xb0
[  538.749966][T20806]  ? kernfs_activate+0x3fc/0x420
[  538.754880][T20806]  kernfs_new_node+0x95/0x160
[  538.759530][T20806]  __kernfs_create_file+0x45/0x260
[  538.764619][T20806]  sysfs_add_file_mode_ns+0x293/0x340
[  538.769964][T20806]  internal_create_group+0x560/0xf10
[  538.775227][T20806]  ? sysfs_create_group+0x20/0x20
[  538.780232][T20806]  sysfs_create_groups+0x5d/0x130
[  538.785235][T20806]  device_add+0xae5/0x18a0
[  538.789627][T20806]  ? get_device+0x30/0x30
[  538.793949][T20806]  ? virtual_device_parent+0x50/0x50
[  538.799212][T20806]  ? pm_runtime_init+0x206/0x320
[  538.804127][T20806]  ? device_initialize+0x1d3/0x3e0
[  538.809215][T20806]  netdev_register_kobject+0x178/0x310
[  538.814648][T20806]  ? raw_notifier_call_chain+0xf2/0x110
[  538.820361][T20806]  register_netdevice+0xbc7/0x1480
[  538.825450][T20806]  ? netdev_update_lockdep_key+0x10/0x10
[  538.831057][T20806]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  538.836072][T20806]  ? __rcu_read_lock+0x50/0x50
[  538.840819][T20806]  ? alloc_netdev_mqs+0xa0c/0xc60
[  538.845822][T20806]  ? vti6_locate+0x551/0x910
[  538.850393][T20806]  vti6_locate+0x610/0x910
[  538.854806][T20806]  ? cap_capable+0x23f/0x280
[  538.859459][T20806]  ? vti6_link_config+0x530/0x530
[  538.864566][T20806]  ? vti6_ioctl+0xa64/0x1b10
[  538.869175][T20806]  vti6_ioctl+0xa88/0x1b10
[  538.873572][T20806]  ? vti6_tnl_xmit+0x1720/0x1720
[  538.878486][T20806]  ? __rcu_read_lock+0x50/0x50
[  538.883235][T20806]  ? check_preemption_disabled+0x154/0x330
[  538.889041][T20806]  ? avc_has_extended_perms+0xb5e/0x1140
[  538.894650][T20806]  ? full_name_hash+0xb4/0xe0
[  538.899314][T20806]  dev_ifsioc+0x675/0xa70
[  538.903636][T20806]  ? mutex_lock+0xa6/0x110
[  538.908036][T20806]  ? dev_ioctl+0xab0/0xab0
[  538.912479][T20806]  dev_ioctl+0x558/0xab0
[  538.916699][T20806]  sock_ioctl+0x677/0x760
[  538.921005][T20806]  ? sock_poll+0x2f0/0x2f0
[  538.925406][T20806]  ? memset+0x1f/0x40
[  538.929372][T20806]  ? fsnotify+0x1332/0x13f0
[  538.933973][T20806]  ? sock_poll+0x2f0/0x2f0
[  538.938373][T20806]  do_vfs_ioctl+0x76a/0x1720
[  538.943027][T20806]  ? selinux_file_ioctl+0x72f/0x990
[  538.948207][T20806]  ? ioctl_preallocate+0x250/0x250
[  538.953309][T20806]  ? __fget+0x37b/0x3c0
[  538.957448][T20806]  ? vfs_write+0x422/0x4e0
[  538.961856][T20806]  ? fget_many+0x20/0x20
[  538.966076][T20806]  ? debug_smp_processor_id+0x20/0x20
[  538.971424][T20806]  ? security_file_ioctl+0x9d/0xb0
[  538.976525][T20806]  __x64_sys_ioctl+0xd4/0x110
[  538.981197][T20806]  do_syscall_64+0xcb/0x1e0
[  538.985675][T20806]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  538.991543][T20806] RIP: 0033:0x466459
[  538.995499][T20806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  539.015096][T20806] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  539.023569][T20806] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  539.031518][T20806] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:24 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e400900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:24 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x7000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:24 executing program 0 (fault-call:8 fault-nth:58):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  539.039475][T20806] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  539.047519][T20806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  539.055467][T20806] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:24 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x300}, @mcast2}})

21:32:24 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x10], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:24 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x8000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  539.113687][T20817] EXT4-fs (loop1): Can't read superblock on 2nd try
[  539.115955][T20816] x_tables: duplicate underflow at hook 2
[  539.142733][T20824] FAULT_INJECTION: forcing a failure.
[  539.142733][T20824] name failslab, interval 1, probability 0, space 0, times 0
[  539.156028][T20824] CPU: 0 PID: 20824 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  539.166264][T20824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  539.176315][T20824] Call Trace:
[  539.179607][T20824]  dump_stack+0x1d8/0x24e
[  539.183942][T20824]  ? devkmsg_release+0x11c/0x11c
[  539.188887][T20824]  ? mutex_unlock+0x19/0x40
[  539.193133][T20817] EXT4-fs (loop1): Can't read superblock on 2nd try
[  539.193395][T20824]  ? show_regs_print_info+0x12/0x12
[  539.205331][T20824]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  539.211390][T20824]  should_fail+0x6f6/0x860
[  539.216046][T20824]  ? setup_fault_attr+0x3d0/0x3d0
[  539.221060][T20824]  ? _raw_spin_lock+0xa3/0x1b0
[  539.225945][T20824]  ? __kernfs_new_node+0xdb/0x6d0
[  539.230959][T20824]  should_failslab+0x5/0x20
[  539.235440][T20824]  kmem_cache_alloc+0x36/0x290
[  539.240197][T20824]  __kernfs_new_node+0xdb/0x6d0
[  539.245028][T20824]  ? mutex_lock+0xa6/0x110
[  539.249420][T20824]  ? kernfs_new_node+0x160/0x160
[  539.254334][T20824]  ? security_kernfs_init_security+0x9a/0xb0
[  539.260288][T20824]  ? kernfs_activate+0x3fc/0x420
[  539.265200][T20824]  kernfs_new_node+0x95/0x160
[  539.269863][T20824]  __kernfs_create_file+0x45/0x260
[  539.274971][T20824]  sysfs_add_file_mode_ns+0x293/0x340
[  539.280328][T20824]  internal_create_group+0x560/0xf10
[  539.285591][T20824]  ? sysfs_create_group+0x20/0x20
[  539.290601][T20824]  sysfs_create_groups+0x5d/0x130
[  539.295622][T20824]  device_add+0xae5/0x18a0
[  539.300030][T20824]  ? get_device+0x30/0x30
[  539.304344][T20824]  ? virtual_device_parent+0x50/0x50
[  539.309619][T20824]  ? pm_runtime_init+0x206/0x320
[  539.314537][T20824]  ? device_initialize+0x1d3/0x3e0
[  539.319634][T20824]  netdev_register_kobject+0x178/0x310
[  539.325072][T20824]  ? raw_notifier_call_chain+0xf2/0x110
[  539.330595][T20824]  register_netdevice+0xbc7/0x1480
[  539.335685][T20824]  ? netdev_update_lockdep_key+0x10/0x10
[  539.341305][T20824]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  539.346307][T20824]  ? __rcu_read_lock+0x50/0x50
[  539.351045][T20824]  ? alloc_netdev_mqs+0xa0c/0xc60
[  539.356044][T20824]  ? vti6_locate+0x551/0x910
[  539.360609][T20824]  vti6_locate+0x610/0x910
[  539.365025][T20824]  ? cap_capable+0x23f/0x280
[  539.369593][T20824]  ? vti6_link_config+0x530/0x530
[  539.374592][T20824]  ? vti6_ioctl+0xa64/0x1b10
[  539.379157][T20824]  vti6_ioctl+0xa88/0x1b10
[  539.383574][T20824]  ? vti6_tnl_xmit+0x1720/0x1720
[  539.388634][T20824]  ? __rcu_read_lock+0x50/0x50
[  539.393557][T20824]  ? check_preemption_disabled+0x154/0x330
[  539.399346][T20824]  ? avc_has_extended_perms+0xb5e/0x1140
[  539.404980][T20824]  ? full_name_hash+0xb4/0xe0
[  539.409630][T20824]  dev_ifsioc+0x675/0xa70
[  539.413936][T20824]  ? mutex_lock+0xa6/0x110
[  539.418329][T20824]  ? dev_ioctl+0xab0/0xab0
[  539.422719][T20824]  dev_ioctl+0x558/0xab0
[  539.426938][T20824]  sock_ioctl+0x677/0x760
[  539.431244][T20824]  ? sock_poll+0x2f0/0x2f0
[  539.435636][T20824]  ? memset+0x1f/0x40
[  539.439591][T20824]  ? fsnotify+0x1332/0x13f0
[  539.444066][T20824]  ? sock_poll+0x2f0/0x2f0
[  539.448454][T20824]  do_vfs_ioctl+0x76a/0x1720
[  539.453039][T20824]  ? selinux_file_ioctl+0x72f/0x990
[  539.458274][T20824]  ? ioctl_preallocate+0x250/0x250
[  539.463370][T20824]  ? __fget+0x37b/0x3c0
[  539.467506][T20824]  ? vfs_write+0x422/0x4e0
[  539.471903][T20824]  ? fget_many+0x20/0x20
[  539.476254][T20824]  ? debug_smp_processor_id+0x20/0x20
[  539.481609][T20824]  ? security_file_ioctl+0x9d/0xb0
[  539.486715][T20824]  __x64_sys_ioctl+0xd4/0x110
[  539.491378][T20824]  do_syscall_64+0xcb/0x1e0
[  539.495867][T20824]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  539.501744][T20824] RIP: 0033:0x466459
21:32:24 executing program 0 (fault-call:8 fault-nth:59):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  539.505647][T20824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  539.525354][T20824] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  539.533747][T20824] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  539.541709][T20824] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  539.549656][T20824] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  539.557601][T20824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:32:24 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e500900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:24 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x11], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  539.565553][T20824] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  539.594530][T20829] FAULT_INJECTION: forcing a failure.
[  539.594530][T20829] name failslab, interval 1, probability 0, space 0, times 0
[  539.612928][T20832] x_tables: duplicate underflow at hook 2
[  539.619682][T20829] CPU: 0 PID: 20829 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  539.629920][T20829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  539.639971][T20829] Call Trace:
[  539.643268][T20829]  dump_stack+0x1d8/0x24e
[  539.647601][T20829]  ? devkmsg_release+0x11c/0x11c
[  539.652529][T20829]  ? mutex_unlock+0x19/0x40
[  539.657014][T20829]  ? show_regs_print_info+0x12/0x12
[  539.662189][T20829]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  539.668228][T20829]  should_fail+0x6f6/0x860
[  539.672620][T20829]  ? setup_fault_attr+0x3d0/0x3d0
[  539.677619][T20829]  ? _raw_spin_lock+0xa3/0x1b0
[  539.682354][T20829]  ? __kernfs_new_node+0xdb/0x6d0
[  539.687351][T20829]  should_failslab+0x5/0x20
[  539.691827][T20829]  kmem_cache_alloc+0x36/0x290
[  539.696563][T20829]  __kernfs_new_node+0xdb/0x6d0
[  539.701386][T20829]  ? mutex_lock+0xa6/0x110
[  539.705776][T20829]  ? kernfs_new_node+0x160/0x160
[  539.710687][T20829]  ? security_kernfs_init_security+0x9a/0xb0
[  539.716637][T20829]  ? kernfs_activate+0x3fc/0x420
[  539.721547][T20829]  kernfs_new_node+0x95/0x160
[  539.726197][T20829]  __kernfs_create_file+0x45/0x260
[  539.731283][T20829]  sysfs_add_file_mode_ns+0x293/0x340
[  539.736628][T20829]  internal_create_group+0x560/0xf10
[  539.741905][T20829]  ? sysfs_create_group+0x20/0x20
[  539.746903][T20829]  sysfs_create_groups+0x5d/0x130
[  539.751902][T20829]  device_add+0xae5/0x18a0
[  539.756292][T20829]  ? get_device+0x30/0x30
[  539.760596][T20829]  ? virtual_device_parent+0x50/0x50
[  539.765851][T20829]  ? pm_runtime_init+0x206/0x320
[  539.770763][T20829]  ? device_initialize+0x1d3/0x3e0
[  539.775848][T20829]  netdev_register_kobject+0x178/0x310
[  539.781282][T20829]  ? raw_notifier_call_chain+0xf2/0x110
[  539.786802][T20829]  register_netdevice+0xbc7/0x1480
[  539.791890][T20829]  ? netdev_update_lockdep_key+0x10/0x10
[  539.797498][T20829]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  539.802495][T20829]  ? __rcu_read_lock+0x50/0x50
[  539.807230][T20829]  ? alloc_netdev_mqs+0xa0c/0xc60
[  539.812227][T20829]  ? vti6_locate+0x551/0x910
[  539.816789][T20829]  vti6_locate+0x610/0x910
[  539.821198][T20829]  ? cap_capable+0x23f/0x280
[  539.825761][T20829]  ? vti6_link_config+0x530/0x530
[  539.830758][T20829]  ? vti6_ioctl+0xa64/0x1b10
[  539.835322][T20829]  vti6_ioctl+0xa88/0x1b10
[  539.839717][T20829]  ? vti6_tnl_xmit+0x1720/0x1720
[  539.844637][T20829]  ? __rcu_read_lock+0x50/0x50
[  539.849377][T20829]  ? check_preemption_disabled+0x154/0x330
[  539.855164][T20829]  ? avc_has_extended_perms+0xb5e/0x1140
[  539.860771][T20829]  ? full_name_hash+0xb4/0xe0
[  539.865439][T20829]  dev_ifsioc+0x675/0xa70
[  539.869743][T20829]  ? mutex_lock+0xa6/0x110
[  539.874132][T20829]  ? dev_ioctl+0xab0/0xab0
[  539.878520][T20829]  dev_ioctl+0x558/0xab0
[  539.882739][T20829]  sock_ioctl+0x677/0x760
[  539.887043][T20829]  ? sock_poll+0x2f0/0x2f0
[  539.891432][T20829]  ? memset+0x1f/0x40
[  539.895386][T20829]  ? fsnotify+0x1332/0x13f0
[  539.899878][T20829]  ? sock_poll+0x2f0/0x2f0
[  539.904290][T20829]  do_vfs_ioctl+0x76a/0x1720
[  539.908860][T20829]  ? selinux_file_ioctl+0x72f/0x990
[  539.914035][T20829]  ? ioctl_preallocate+0x250/0x250
[  539.919142][T20829]  ? __fget+0x37b/0x3c0
[  539.923283][T20829]  ? vfs_write+0x422/0x4e0
[  539.927678][T20829]  ? fget_many+0x20/0x20
[  539.931903][T20829]  ? debug_smp_processor_id+0x20/0x20
[  539.937247][T20829]  ? security_file_ioctl+0x9d/0xb0
[  539.942329][T20829]  __x64_sys_ioctl+0xd4/0x110
[  539.946978][T20829]  do_syscall_64+0xcb/0x1e0
[  539.951456][T20829]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  539.957319][T20829] RIP: 0033:0x466459
[  539.961204][T20829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  539.980780][T20829] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  539.989176][T20829] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  539.997123][T20829] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  540.005066][T20829] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
21:32:25 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x9000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:25 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:25 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x12], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:25 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xa000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:25 executing program 0 (fault-call:8 fault-nth:60):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  540.013010][T20829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  540.020955][T20829] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  540.041362][T20837] EXT4-fs (loop1): Can't read superblock on 2nd try
[  540.061245][T20842] x_tables: duplicate underflow at hook 2
21:32:25 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x2300}, @mcast2}})

21:32:25 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xb000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:25 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x25], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  540.068985][T20815] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  540.113016][T20851] x_tables: duplicate underflow at hook 2
[  540.117444][T20852] FAULT_INJECTION: forcing a failure.
[  540.117444][T20852] name failslab, interval 1, probability 0, space 0, times 0
[  540.131794][T20852] CPU: 1 PID: 20852 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  540.142022][T20852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  540.152069][T20852] Call Trace:
[  540.155365][T20852]  dump_stack+0x1d8/0x24e
21:32:25 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xc000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:25 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x48], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  540.159697][T20852]  ? devkmsg_release+0x11c/0x11c
[  540.164634][T20852]  ? mutex_unlock+0x19/0x40
[  540.169147][T20852]  ? show_regs_print_info+0x12/0x12
[  540.176698][T20852]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  540.178280][T20858] x_tables: duplicate underflow at hook 2
[  540.182765][T20852]  should_fail+0x6f6/0x860
[  540.182775][T20852]  ? setup_fault_attr+0x3d0/0x3d0
[  540.182786][T20852]  ? _raw_spin_lock+0xa3/0x1b0
[  540.182796][T20852]  ? __kernfs_new_node+0xdb/0x6d0
[  540.182813][T20852]  should_failslab+0x5/0x20
[  540.212191][T20852]  kmem_cache_alloc+0x36/0x290
[  540.216964][T20852]  __kernfs_new_node+0xdb/0x6d0
[  540.221794][T20852]  ? mutex_lock+0xa6/0x110
[  540.226189][T20852]  ? kernfs_new_node+0x160/0x160
[  540.231102][T20852]  ? security_kernfs_init_security+0x9a/0xb0
[  540.237056][T20852]  ? kernfs_activate+0x3fc/0x420
[  540.241966][T20852]  kernfs_new_node+0x95/0x160
[  540.246617][T20852]  __kernfs_create_file+0x45/0x260
[  540.251702][T20852]  sysfs_add_file_mode_ns+0x293/0x340
[  540.257048][T20852]  internal_create_group+0x560/0xf10
[  540.262307][T20852]  ? sysfs_create_group+0x20/0x20
[  540.267304][T20852]  sysfs_create_groups+0x5d/0x130
[  540.272306][T20852]  device_add+0xae5/0x18a0
[  540.276696][T20852]  ? get_device+0x30/0x30
[  540.280999][T20852]  ? virtual_device_parent+0x50/0x50
[  540.286273][T20852]  ? pm_runtime_init+0x206/0x320
[  540.291183][T20852]  ? device_initialize+0x1d3/0x3e0
[  540.296272][T20852]  netdev_register_kobject+0x178/0x310
[  540.301705][T20852]  ? raw_notifier_call_chain+0xf2/0x110
[  540.307223][T20852]  register_netdevice+0xbc7/0x1480
[  540.312308][T20852]  ? netdev_update_lockdep_key+0x10/0x10
[  540.317935][T20852]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  540.322933][T20852]  ? __rcu_read_lock+0x50/0x50
[  540.327669][T20852]  ? alloc_netdev_mqs+0xa0c/0xc60
[  540.332665][T20852]  ? vti6_locate+0x551/0x910
[  540.337244][T20852]  vti6_locate+0x610/0x910
[  540.341654][T20852]  ? cap_capable+0x23f/0x280
[  540.346225][T20852]  ? vti6_link_config+0x530/0x530
[  540.351236][T20852]  ? vti6_ioctl+0xa64/0x1b10
[  540.355801][T20852]  vti6_ioctl+0xa88/0x1b10
[  540.360191][T20852]  ? vti6_tnl_xmit+0x1720/0x1720
[  540.365102][T20852]  ? __rcu_read_unlock+0x1cd/0x6a0
[  540.370189][T20852]  ? __rcu_read_lock+0x50/0x50
[  540.374924][T20852]  ? avc_has_extended_perms+0xb5e/0x1140
[  540.380528][T20852]  ? full_name_hash+0xb4/0xe0
[  540.385178][T20852]  dev_ifsioc+0x675/0xa70
[  540.389481][T20852]  ? mutex_lock+0xa6/0x110
[  540.393869][T20852]  ? dev_ioctl+0xab0/0xab0
[  540.398268][T20852]  dev_ioctl+0x558/0xab0
[  540.402484][T20852]  sock_ioctl+0x677/0x760
[  540.406786][T20852]  ? sock_poll+0x2f0/0x2f0
[  540.411174][T20852]  ? memset+0x1f/0x40
[  540.415129][T20852]  ? fsnotify+0x1332/0x13f0
[  540.419606][T20852]  ? sock_poll+0x2f0/0x2f0
[  540.423996][T20852]  do_vfs_ioctl+0x76a/0x1720
[  540.428556][T20852]  ? selinux_file_ioctl+0x72f/0x990
[  540.433727][T20852]  ? ioctl_preallocate+0x250/0x250
[  540.438815][T20852]  ? __fget+0x37b/0x3c0
[  540.442945][T20852]  ? vfs_write+0x422/0x4e0
[  540.447337][T20852]  ? fget_many+0x20/0x20
[  540.451552][T20852]  ? debug_smp_processor_id+0x20/0x20
[  540.456895][T20852]  ? security_file_ioctl+0x9d/0xb0
[  540.461978][T20852]  __x64_sys_ioctl+0xd4/0x110
[  540.466631][T20852]  do_syscall_64+0xcb/0x1e0
[  540.471109][T20852]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  540.476971][T20852] RIP: 0033:0x466459
[  540.480839][T20852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  540.500415][T20852] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  540.508800][T20852] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  540.516746][T20852] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  540.524691][T20852] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  540.532636][T20852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  540.540599][T20852] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:25 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000190fff00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:25 executing program 0 (fault-call:8 fault-nth:61):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:25 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xd000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  540.569781][T20859] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  540.573632][T20868] x_tables: duplicate underflow at hook 2
[  540.584274][T20837] EXT4-fs (loop1): Can't read superblock on 2nd try
[  540.619980][T20871] FAULT_INJECTION: forcing a failure.
[  540.619980][T20871] name failslab, interval 1, probability 0, space 0, times 0
[  540.632964][T20871] CPU: 1 PID: 20871 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  540.643192][T20871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  540.653242][T20871] Call Trace:
[  540.656541][T20871]  dump_stack+0x1d8/0x24e
[  540.660874][T20871]  ? devkmsg_release+0x11c/0x11c
[  540.665832][T20871]  ? mutex_unlock+0x19/0x40
[  540.670357][T20871]  ? show_regs_print_info+0x12/0x12
[  540.675657][T20871]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  540.681848][T20871]  should_fail+0x6f6/0x860
[  540.686249][T20871]  ? setup_fault_attr+0x3d0/0x3d0
[  540.691252][T20871]  ? _raw_spin_lock+0xa3/0x1b0
[  540.695992][T20871]  ? __kernfs_new_node+0xdb/0x6d0
[  540.700991][T20871]  should_failslab+0x5/0x20
[  540.705474][T20871]  kmem_cache_alloc+0x36/0x290
[  540.710283][T20871]  __kernfs_new_node+0xdb/0x6d0
[  540.715219][T20871]  ? mutex_lock+0xa6/0x110
[  540.719614][T20871]  ? kernfs_new_node+0x160/0x160
[  540.724526][T20871]  ? security_kernfs_init_security+0x9a/0xb0
[  540.730482][T20871]  ? kernfs_activate+0x3fc/0x420
[  540.735398][T20871]  kernfs_new_node+0x95/0x160
[  540.740053][T20871]  __kernfs_create_file+0x45/0x260
[  540.745141][T20871]  sysfs_add_file_mode_ns+0x293/0x340
[  540.750493][T20871]  internal_create_group+0x560/0xf10
[  540.755764][T20871]  ? sysfs_create_group+0x20/0x20
[  540.760763][T20871]  sysfs_create_groups+0x5d/0x130
[  540.765762][T20871]  device_add+0xae5/0x18a0
[  540.770159][T20871]  ? get_device+0x30/0x30
[  540.774462][T20871]  ? virtual_device_parent+0x50/0x50
[  540.779718][T20871]  ? pm_runtime_init+0x206/0x320
[  540.784644][T20871]  ? device_initialize+0x1d3/0x3e0
[  540.789742][T20871]  netdev_register_kobject+0x178/0x310
[  540.795180][T20871]  ? raw_notifier_call_chain+0xf2/0x110
[  540.800708][T20871]  register_netdevice+0xbc7/0x1480
[  540.805796][T20871]  ? netdev_update_lockdep_key+0x10/0x10
[  540.811404][T20871]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  540.816402][T20871]  ? __rcu_read_lock+0x50/0x50
[  540.821139][T20871]  ? alloc_netdev_mqs+0xa0c/0xc60
[  540.826152][T20871]  ? vti6_locate+0x551/0x910
[  540.830819][T20871]  vti6_locate+0x610/0x910
[  540.835213][T20871]  ? cap_capable+0x23f/0x280
[  540.839784][T20871]  ? vti6_link_config+0x530/0x530
[  540.844785][T20871]  ? vti6_ioctl+0xa64/0x1b10
[  540.849352][T20871]  vti6_ioctl+0xa88/0x1b10
[  540.853761][T20871]  ? vti6_tnl_xmit+0x1720/0x1720
[  540.858792][T20871]  ? __rcu_read_lock+0x50/0x50
[  540.863554][T20871]  ? check_preemption_disabled+0x154/0x330
[  540.869534][T20871]  ? avc_has_extended_perms+0xb5e/0x1140
[  540.875142][T20871]  ? full_name_hash+0xb4/0xe0
[  540.879888][T20871]  dev_ifsioc+0x675/0xa70
[  540.884194][T20871]  ? mutex_lock+0xa6/0x110
[  540.888585][T20871]  ? dev_ioctl+0xab0/0xab0
[  540.892986][T20871]  dev_ioctl+0x558/0xab0
[  540.897268][T20871]  sock_ioctl+0x677/0x760
[  540.901585][T20871]  ? sock_poll+0x2f0/0x2f0
[  540.905985][T20871]  ? memset+0x1f/0x40
[  540.909946][T20871]  ? fsnotify+0x1332/0x13f0
[  540.914430][T20871]  ? sock_poll+0x2f0/0x2f0
[  540.918838][T20871]  do_vfs_ioctl+0x76a/0x1720
[  540.923413][T20871]  ? selinux_file_ioctl+0x72f/0x990
[  540.928668][T20871]  ? ioctl_preallocate+0x250/0x250
[  540.933777][T20871]  ? __fget+0x37b/0x3c0
[  540.937941][T20871]  ? vfs_write+0x422/0x4e0
[  540.942333][T20871]  ? fget_many+0x20/0x20
[  540.946556][T20871]  ? debug_smp_processor_id+0x20/0x20
[  540.951905][T20871]  ? security_file_ioctl+0x9d/0xb0
[  540.957016][T20871]  __x64_sys_ioctl+0xd4/0x110
[  540.961671][T20871]  do_syscall_64+0xcb/0x1e0
[  540.966152][T20871]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  540.972025][T20871] RIP: 0033:0x466459
[  540.975892][T20871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  540.996604][T20871] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  541.004993][T20871] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  541.014189][T20871] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  541.022232][T20871] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  541.030189][T20871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  541.038136][T20871] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:26 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:26 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:26 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x2d00}, @mcast2}})

21:32:26 executing program 0 (fault-call:8 fault-nth:62):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:26 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xe000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  541.179827][T20880] FAULT_INJECTION: forcing a failure.
[  541.179827][T20880] name failslab, interval 1, probability 0, space 0, times 0
[  541.200840][T20887] x_tables: duplicate underflow at hook 2
[  541.201877][T20880] CPU: 0 PID: 20880 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  541.216823][T20880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  541.226872][T20880] Call Trace:
[  541.230161][T20880]  dump_stack+0x1d8/0x24e
[  541.234479][T20880]  ? devkmsg_release+0x11c/0x11c
[  541.239439][T20880]  ? mutex_unlock+0x19/0x40
[  541.243922][T20880]  ? show_regs_print_info+0x12/0x12
[  541.249099][T20880]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  541.255285][T20880]  should_fail+0x6f6/0x860
[  541.259685][T20880]  ? setup_fault_attr+0x3d0/0x3d0
[  541.264687][T20880]  ? _raw_spin_lock+0xa3/0x1b0
[  541.269430][T20880]  ? __kernfs_new_node+0xdb/0x6d0
[  541.274429][T20880]  should_failslab+0x5/0x20
[  541.278924][T20880]  kmem_cache_alloc+0x36/0x290
[  541.283670][T20880]  __kernfs_new_node+0xdb/0x6d0
[  541.288494][T20880]  ? mutex_lock+0xa6/0x110
[  541.292900][T20880]  ? kernfs_new_node+0x160/0x160
[  541.298939][T20880]  ? security_kernfs_init_security+0x9a/0xb0
[  541.304913][T20880]  ? kernfs_activate+0x3fc/0x420
[  541.309823][T20880]  kernfs_new_node+0x95/0x160
[  541.314476][T20880]  __kernfs_create_file+0x45/0x260
[  541.319563][T20880]  sysfs_add_file_mode_ns+0x293/0x340
[  541.324906][T20880]  internal_create_group+0x560/0xf10
[  541.330167][T20880]  ? sysfs_create_group+0x20/0x20
[  541.335166][T20880]  sysfs_create_groups+0x5d/0x130
[  541.340171][T20880]  device_add+0xae5/0x18a0
[  541.344582][T20880]  ? get_device+0x30/0x30
[  541.348883][T20880]  ? virtual_device_parent+0x50/0x50
[  541.354155][T20880]  ? pm_runtime_init+0x206/0x320
[  541.359064][T20880]  ? device_initialize+0x1d3/0x3e0
[  541.364153][T20880]  netdev_register_kobject+0x178/0x310
[  541.369585][T20880]  ? raw_notifier_call_chain+0xf2/0x110
[  541.375107][T20880]  register_netdevice+0xbc7/0x1480
[  541.380191][T20880]  ? netdev_update_lockdep_key+0x10/0x10
[  541.385795][T20880]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  541.390792][T20880]  ? __rcu_read_lock+0x50/0x50
[  541.395526][T20880]  ? alloc_netdev_mqs+0xa0c/0xc60
[  541.400541][T20880]  ? vti6_locate+0x551/0x910
[  541.405100][T20880]  vti6_locate+0x610/0x910
[  541.409490][T20880]  ? cap_capable+0x23f/0x280
[  541.414051][T20880]  ? vti6_link_config+0x530/0x530
[  541.419048][T20880]  ? vti6_ioctl+0xa64/0x1b10
[  541.423632][T20880]  vti6_ioctl+0xa88/0x1b10
[  541.428024][T20880]  ? vti6_tnl_xmit+0x1720/0x1720
[  541.432935][T20880]  ? __rcu_read_lock+0x50/0x50
[  541.437675][T20880]  ? check_preemption_disabled+0x154/0x330
[  541.443455][T20880]  ? avc_has_extended_perms+0xb5e/0x1140
[  541.449059][T20880]  ? full_name_hash+0xb4/0xe0
[  541.456926][T20880]  dev_ifsioc+0x675/0xa70
[  541.461228][T20880]  ? mutex_lock+0xa6/0x110
[  541.465616][T20880]  ? dev_ioctl+0xab0/0xab0
[  541.470002][T20880]  dev_ioctl+0x558/0xab0
[  541.474218][T20880]  sock_ioctl+0x677/0x760
[  541.478518][T20880]  ? sock_poll+0x2f0/0x2f0
[  541.482905][T20880]  ? memset+0x1f/0x40
[  541.486859][T20880]  ? fsnotify+0x1332/0x13f0
[  541.491335][T20880]  ? sock_poll+0x2f0/0x2f0
[  541.495727][T20880]  do_vfs_ioctl+0x76a/0x1720
[  541.500313][T20880]  ? selinux_file_ioctl+0x72f/0x990
[  541.505488][T20880]  ? ioctl_preallocate+0x250/0x250
[  541.510581][T20880]  ? __fget+0x37b/0x3c0
[  541.514708][T20880]  ? vfs_write+0x422/0x4e0
[  541.519096][T20880]  ? fget_many+0x20/0x20
[  541.523314][T20880]  ? debug_smp_processor_id+0x20/0x20
[  541.528661][T20880]  ? security_file_ioctl+0x9d/0xb0
[  541.533747][T20880]  __x64_sys_ioctl+0xd4/0x110
[  541.538408][T20880]  do_syscall_64+0xcb/0x1e0
[  541.542883][T20880]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  541.548749][T20880] RIP: 0033:0x466459
[  541.552618][T20880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  541.572194][T20880] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
21:32:26 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x60], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:26 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x10000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:26 executing program 0 (fault-call:8 fault-nth:63):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:26 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000200900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  541.580575][T20880] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  541.588538][T20880] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  541.596484][T20880] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  541.604433][T20880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  541.612469][T20880] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:26 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x68], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  541.641684][T20888] EXT4-fs (loop1): Can't read superblock on 2nd try
[  541.657956][T20898] x_tables: duplicate underflow at hook 2
[  541.668610][T20899] secmark_tg_check: 17 callbacks suppressed
[  541.668615][T20899] xt_SECMARK: invalid mode: 0
[  541.670740][T20886] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  541.691507][T20901] FAULT_INJECTION: forcing a failure.
[  541.691507][T20901] name failslab, interval 1, probability 0, space 0, times 0
[  541.694145][T20904] xt_SECMARK: invalid mode: 0
[  541.705758][T20901] CPU: 1 PID: 20901 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  541.719073][T20901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  541.729112][T20901] Call Trace:
[  541.732388][T20901]  dump_stack+0x1d8/0x24e
[  541.736697][T20901]  ? devkmsg_release+0x11c/0x11c
[  541.741682][T20901]  ? mutex_unlock+0x19/0x40
[  541.746169][T20901]  ? show_regs_print_info+0x12/0x12
[  541.751501][T20901]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  541.757667][T20901]  should_fail+0x6f6/0x860
[  541.762064][T20901]  ? setup_fault_attr+0x3d0/0x3d0
[  541.767066][T20901]  ? _raw_spin_lock+0xa3/0x1b0
[  541.771820][T20901]  ? __kernfs_new_node+0xdb/0x6d0
[  541.776819][T20901]  should_failslab+0x5/0x20
[  541.781306][T20901]  kmem_cache_alloc+0x36/0x290
[  541.786095][T20901]  __kernfs_new_node+0xdb/0x6d0
[  541.790931][T20901]  ? mutex_lock+0xa6/0x110
[  541.795323][T20901]  ? kernfs_new_node+0x160/0x160
[  541.800372][T20901]  ? security_kernfs_init_security+0x9a/0xb0
[  541.806337][T20901]  ? kernfs_activate+0x3fc/0x420
[  541.811363][T20901]  kernfs_new_node+0x95/0x160
[  541.816030][T20901]  __kernfs_create_file+0x45/0x260
[  541.821121][T20901]  sysfs_add_file_mode_ns+0x293/0x340
[  541.826468][T20901]  internal_create_group+0x560/0xf10
[  541.831733][T20901]  ? sysfs_create_group+0x20/0x20
[  541.836732][T20901]  sysfs_create_groups+0x5d/0x130
[  541.841733][T20901]  device_add+0xae5/0x18a0
[  541.846127][T20901]  ? get_device+0x30/0x30
[  541.850429][T20901]  ? virtual_device_parent+0x50/0x50
[  541.855703][T20901]  ? pm_runtime_init+0x206/0x320
[  541.860631][T20901]  ? device_initialize+0x1d3/0x3e0
[  541.865720][T20901]  netdev_register_kobject+0x178/0x310
[  541.871154][T20901]  ? raw_notifier_call_chain+0xf2/0x110
[  541.876681][T20901]  register_netdevice+0xbc7/0x1480
[  541.881774][T20901]  ? netdev_update_lockdep_key+0x10/0x10
[  541.887404][T20901]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  541.892404][T20901]  ? __rcu_read_lock+0x50/0x50
[  541.897165][T20901]  ? alloc_netdev_mqs+0xa0c/0xc60
[  541.902225][T20901]  ? vti6_locate+0x551/0x910
[  541.906794][T20901]  vti6_locate+0x610/0x910
[  541.911189][T20901]  ? cap_capable+0x23f/0x280
[  541.915772][T20901]  ? vti6_link_config+0x530/0x530
[  541.920803][T20901]  ? vti6_ioctl+0xa64/0x1b10
[  541.925384][T20901]  vti6_ioctl+0xa88/0x1b10
[  541.929773][T20901]  ? vti6_tnl_xmit+0x1720/0x1720
[  541.934685][T20901]  ? __rcu_read_lock+0x50/0x50
[  541.939422][T20901]  ? check_preemption_disabled+0x154/0x330
[  541.945203][T20901]  ? avc_has_extended_perms+0xb5e/0x1140
[  541.950811][T20901]  ? full_name_hash+0xb4/0xe0
[  541.955477][T20901]  dev_ifsioc+0x675/0xa70
[  541.959784][T20901]  ? mutex_lock+0xa6/0x110
[  541.964194][T20901]  ? dev_ioctl+0xab0/0xab0
[  541.968594][T20901]  dev_ioctl+0x558/0xab0
[  541.972812][T20901]  sock_ioctl+0x677/0x760
[  541.977112][T20901]  ? sock_poll+0x2f0/0x2f0
[  541.981502][T20901]  ? memset+0x1f/0x40
[  541.985455][T20901]  ? fsnotify+0x1332/0x13f0
[  541.989928][T20901]  ? sock_poll+0x2f0/0x2f0
[  541.994316][T20901]  do_vfs_ioctl+0x76a/0x1720
[  541.998879][T20901]  ? selinux_file_ioctl+0x72f/0x990
[  542.004048][T20901]  ? ioctl_preallocate+0x250/0x250
[  542.009226][T20901]  ? __fget+0x37b/0x3c0
[  542.013371][T20901]  ? vfs_write+0x422/0x4e0
[  542.017762][T20901]  ? fget_many+0x20/0x20
[  542.021996][T20901]  ? debug_smp_processor_id+0x20/0x20
[  542.027450][T20901]  ? security_file_ioctl+0x9d/0xb0
[  542.032552][T20901]  __x64_sys_ioctl+0xd4/0x110
[  542.037213][T20901]  do_syscall_64+0xcb/0x1e0
21:32:27 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x11000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  542.041698][T20901]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  542.047570][T20901] RIP: 0033:0x466459
[  542.051452][T20901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  542.071050][T20901] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  542.079439][T20901] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:27 executing program 0 (fault-call:8 fault-nth:64):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  542.087402][T20901] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  542.095373][T20901] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  542.103333][T20901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  542.111297][T20901] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  542.154129][T20911] xt_SECMARK: invalid mode: 0
[  542.160606][T20907] FAULT_INJECTION: forcing a failure.
[  542.160606][T20907] name failslab, interval 1, probability 0, space 0, times 0
[  542.160703][T20912] xt_SECMARK: invalid mode: 0
[  542.174517][T20907] CPU: 0 PID: 20907 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  542.189324][T20907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  542.199363][T20907] Call Trace:
[  542.202638][T20907]  dump_stack+0x1d8/0x24e
[  542.206955][T20907]  ? devkmsg_release+0x11c/0x11c
[  542.211873][T20907]  ? mutex_unlock+0x19/0x40
[  542.216351][T20907]  ? show_regs_print_info+0x12/0x12
[  542.221523][T20907]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  542.227567][T20907]  should_fail+0x6f6/0x860
[  542.231973][T20907]  ? setup_fault_attr+0x3d0/0x3d0
[  542.236970][T20907]  ? _raw_spin_lock+0xa3/0x1b0
[  542.241712][T20907]  ? __kernfs_new_node+0xdb/0x6d0
[  542.246718][T20907]  should_failslab+0x5/0x20
[  542.251192][T20907]  kmem_cache_alloc+0x36/0x290
[  542.255928][T20907]  __kernfs_new_node+0xdb/0x6d0
[  542.260753][T20907]  ? mutex_lock+0xa6/0x110
[  542.265143][T20907]  ? kernfs_new_node+0x160/0x160
[  542.270065][T20907]  ? kernfs_activate+0x3fc/0x420
[  542.274979][T20907]  kernfs_new_node+0x95/0x160
[  542.279631][T20907]  __kernfs_create_file+0x45/0x260
[  542.284716][T20907]  sysfs_add_file_mode_ns+0x293/0x340
[  542.290063][T20907]  internal_create_group+0x560/0xf10
[  542.295340][T20907]  ? sysfs_create_group+0x20/0x20
[  542.300339][T20907]  sysfs_create_groups+0x5d/0x130
[  542.305359][T20907]  device_add+0xae5/0x18a0
[  542.309751][T20907]  ? get_device+0x30/0x30
[  542.314050][T20907]  ? virtual_device_parent+0x50/0x50
[  542.319309][T20907]  ? pm_runtime_init+0x206/0x320
[  542.324240][T20907]  ? device_initialize+0x1d3/0x3e0
[  542.329328][T20907]  netdev_register_kobject+0x178/0x310
[  542.334778][T20907]  ? raw_notifier_call_chain+0xf2/0x110
[  542.340300][T20907]  register_netdevice+0xbc7/0x1480
[  542.345385][T20907]  ? netdev_update_lockdep_key+0x10/0x10
[  542.350992][T20907]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  542.355991][T20907]  ? __rcu_read_lock+0x50/0x50
[  542.360729][T20907]  ? alloc_netdev_mqs+0xa0c/0xc60
[  542.365737][T20907]  ? vti6_locate+0x551/0x910
[  542.370308][T20907]  vti6_locate+0x610/0x910
[  542.374710][T20907]  ? cap_capable+0x23f/0x280
[  542.379274][T20907]  ? vti6_link_config+0x530/0x530
[  542.384272][T20907]  ? vti6_ioctl+0xa64/0x1b10
[  542.388833][T20907]  vti6_ioctl+0xa88/0x1b10
[  542.393226][T20907]  ? vti6_tnl_xmit+0x1720/0x1720
[  542.398138][T20907]  ? __rcu_read_lock+0x50/0x50
[  542.402883][T20907]  ? check_preemption_disabled+0x154/0x330
[  542.408885][T20907]  ? avc_has_extended_perms+0xb5e/0x1140
[  542.414501][T20907]  ? full_name_hash+0xb4/0xe0
[  542.419207][T20907]  dev_ifsioc+0x675/0xa70
[  542.423523][T20907]  ? mutex_lock+0xa6/0x110
[  542.427913][T20907]  ? dev_ioctl+0xab0/0xab0
[  542.432305][T20907]  dev_ioctl+0x558/0xab0
[  542.436571][T20907]  sock_ioctl+0x677/0x760
[  542.440987][T20907]  ? sock_poll+0x2f0/0x2f0
[  542.445376][T20907]  ? memset+0x1f/0x40
[  542.449331][T20907]  ? fsnotify+0x1332/0x13f0
[  542.453806][T20907]  ? sock_poll+0x2f0/0x2f0
[  542.458203][T20907]  do_vfs_ioctl+0x76a/0x1720
[  542.462772][T20907]  ? selinux_file_ioctl+0x72f/0x990
[  542.467960][T20907]  ? ioctl_preallocate+0x250/0x250
[  542.473053][T20907]  ? __fget+0x37b/0x3c0
[  542.477182][T20907]  ? vfs_write+0x422/0x4e0
[  542.481573][T20907]  ? fget_many+0x20/0x20
[  542.485793][T20907]  ? debug_smp_processor_id+0x20/0x20
[  542.491156][T20907]  ? security_file_ioctl+0x9d/0xb0
[  542.496254][T20907]  __x64_sys_ioctl+0xd4/0x110
[  542.500913][T20907]  do_syscall_64+0xcb/0x1e0
[  542.505511][T20907]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  542.511391][T20907] RIP: 0033:0x466459
[  542.515262][T20907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  542.534881][T20907] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  542.543271][T20907] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:27 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:27 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x3300}, @mcast2}})

21:32:27 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:27 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x12000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:27 executing program 0 (fault-call:8 fault-nth:65):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  542.551218][T20907] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  542.559168][T20907] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  542.567120][T20907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  542.575066][T20907] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  542.586154][T20903] EXT4-fs (loop1): Can't read superblock on 2nd try
[  542.621466][T20920] xt_SECMARK: invalid mode: 0
[  542.635778][T20924] FAULT_INJECTION: forcing a failure.
[  542.635778][T20924] name failslab, interval 1, probability 0, space 0, times 0
[  542.637246][T20923] xt_SECMARK: invalid mode: 0
[  542.648517][T20924] CPU: 0 PID: 20924 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  542.663420][T20924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  542.673477][T20924] Call Trace:
[  542.676760][T20924]  dump_stack+0x1d8/0x24e
[  542.681072][T20924]  ? devkmsg_release+0x11c/0x11c
[  542.685985][T20924]  ? mutex_unlock+0x19/0x40
[  542.690459][T20924]  ? show_regs_print_info+0x12/0x12
[  542.695628][T20924]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  542.701754][T20924]  should_fail+0x6f6/0x860
[  542.706140][T20924]  ? setup_fault_attr+0x3d0/0x3d0
[  542.711136][T20924]  ? _raw_spin_lock+0xa3/0x1b0
[  542.715876][T20924]  ? __kernfs_new_node+0xdb/0x6d0
[  542.720870][T20924]  should_failslab+0x5/0x20
[  542.725361][T20924]  kmem_cache_alloc+0x36/0x290
[  542.730112][T20924]  __kernfs_new_node+0xdb/0x6d0
[  542.734936][T20924]  ? mutex_lock+0xa6/0x110
[  542.739339][T20924]  ? kernfs_new_node+0x160/0x160
[  542.744248][T20924]  ? security_kernfs_init_security+0x9a/0xb0
[  542.750200][T20924]  ? kernfs_activate+0x3fc/0x420
[  542.755109][T20924]  kernfs_new_node+0x95/0x160
[  542.759757][T20924]  __kernfs_create_file+0x45/0x260
[  542.764841][T20924]  sysfs_add_file_mode_ns+0x293/0x340
[  542.770188][T20924]  internal_create_group+0x560/0xf10
[  542.775445][T20924]  ? sysfs_create_group+0x20/0x20
[  542.780440][T20924]  sysfs_create_groups+0x5d/0x130
[  542.786392][T20924]  device_add+0xae5/0x18a0
[  542.790796][T20924]  ? get_device+0x30/0x30
[  542.795097][T20924]  ? virtual_device_parent+0x50/0x50
[  542.800351][T20924]  ? pm_runtime_init+0x206/0x320
[  542.805260][T20924]  ? device_initialize+0x1d3/0x3e0
[  542.810344][T20924]  netdev_register_kobject+0x178/0x310
[  542.815791][T20924]  ? raw_notifier_call_chain+0xf2/0x110
[  542.821308][T20924]  register_netdevice+0xbc7/0x1480
[  542.826392][T20924]  ? netdev_update_lockdep_key+0x10/0x10
[  542.831994][T20924]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  542.836988][T20924]  ? __rcu_read_lock+0x50/0x50
[  542.841912][T20924]  ? alloc_netdev_mqs+0xa0c/0xc60
[  542.846907][T20924]  ? vti6_locate+0x551/0x910
[  542.851468][T20924]  vti6_locate+0x610/0x910
[  542.855857][T20924]  ? cap_capable+0x23f/0x280
[  542.860421][T20924]  ? vti6_link_config+0x530/0x530
[  542.865416][T20924]  ? vti6_ioctl+0xa64/0x1b10
[  542.869976][T20924]  vti6_ioctl+0xa88/0x1b10
[  542.874367][T20924]  ? vti6_tnl_xmit+0x1720/0x1720
[  542.879275][T20924]  ? __perf_event_task_sched_in+0x57c/0x5e0
[  542.885137][T20924]  ? __rcu_read_lock+0x50/0x50
[  542.889893][T20924]  ? switch_mm_irqs_off+0x72f/0x9a0
[  542.895076][T20924]  ? avc_has_extended_perms+0xb5e/0x1140
[  542.900685][T20924]  ? full_name_hash+0xb4/0xe0
[  542.905339][T20924]  dev_ifsioc+0x675/0xa70
[  542.909646][T20924]  ? mutex_lock+0xa6/0x110
[  542.914057][T20924]  ? dev_ioctl+0xab0/0xab0
[  542.918458][T20924]  dev_ioctl+0x558/0xab0
[  542.922679][T20924]  sock_ioctl+0x677/0x760
[  542.926982][T20924]  ? sock_poll+0x2f0/0x2f0
[  542.931375][T20924]  ? sock_poll+0x2f0/0x2f0
[  542.935766][T20924]  do_vfs_ioctl+0x76a/0x1720
[  542.940335][T20924]  ? selinux_file_ioctl+0x72f/0x990
[  542.945508][T20924]  ? ioctl_preallocate+0x250/0x250
[  542.950594][T20924]  ? __fget+0x37b/0x3c0
[  542.954737][T20924]  ? vfs_write+0x422/0x4e0
[  542.959127][T20924]  ? fget_many+0x20/0x20
[  542.963344][T20924]  ? debug_smp_processor_id+0x20/0x20
[  542.968706][T20924]  ? security_file_ioctl+0x9d/0xb0
[  542.973790][T20924]  __x64_sys_ioctl+0xd4/0x110
[  542.978441][T20924]  do_syscall_64+0xcb/0x1e0
[  542.982923][T20924]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  542.988789][T20924] RIP: 0033:0x466459
[  542.992655][T20924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  543.012234][T20924] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
21:32:28 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x74], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:28 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x14010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:28 executing program 0 (fault-call:8 fault-nth:66):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:28 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000300900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:28 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x21000}, @mcast2}})

[  543.020615][T20924] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  543.028559][T20924] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  543.036511][T20924] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  543.044468][T20924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  543.052421][T20924] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  543.098252][T20919] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  543.114768][T20929] FAULT_INJECTION: forcing a failure.
[  543.114768][T20929] name failslab, interval 1, probability 0, space 0, times 0
[  543.124064][T20932] xt_check_table_hooks: 2 callbacks suppressed
[  543.124069][T20932] x_tables: duplicate underflow at hook 2
[  543.133165][T20929] CPU: 0 PID: 20929 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  543.142154][T20935] xt_SECMARK: invalid mode: 0
[  543.149545][T20929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  543.149548][T20929] Call Trace:
[  543.149568][T20929]  dump_stack+0x1d8/0x24e
[  543.149587][T20929]  ? devkmsg_release+0x11c/0x11c
[  543.156091][T20938] xt_SECMARK: invalid mode: 0
[  543.164295][T20929]  ? mutex_unlock+0x19/0x40
[  543.164307][T20929]  ? show_regs_print_info+0x12/0x12
[  543.164317][T20929]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  543.164327][T20929]  should_fail+0x6f6/0x860
[  543.164342][T20929]  ? setup_fault_attr+0x3d0/0x3d0
[  543.206688][T20929]  ? _raw_spin_lock+0xa3/0x1b0
[  543.211427][T20929]  ? __kernfs_new_node+0xdb/0x6d0
[  543.216426][T20929]  should_failslab+0x5/0x20
[  543.220902][T20929]  kmem_cache_alloc+0x36/0x290
[  543.225637][T20929]  __kernfs_new_node+0xdb/0x6d0
[  543.230457][T20929]  ? mutex_lock+0xa6/0x110
[  543.234840][T20929]  ? kernfs_new_node+0x160/0x160
[  543.239748][T20929]  ? kernfs_activate+0x3fc/0x420
[  543.244652][T20929]  kernfs_new_node+0x95/0x160
[  543.249298][T20929]  __kernfs_create_file+0x45/0x260
[  543.254396][T20929]  sysfs_add_file_mode_ns+0x293/0x340
[  543.259742][T20929]  internal_create_group+0x560/0xf10
[  543.264997][T20929]  ? sysfs_create_group+0x20/0x20
[  543.270009][T20929]  sysfs_create_groups+0x5d/0x130
[  543.275001][T20929]  device_add+0xae5/0x18a0
[  543.279394][T20929]  ? get_device+0x30/0x30
[  543.283702][T20929]  ? virtual_device_parent+0x50/0x50
[  543.288970][T20929]  ? pm_runtime_init+0x206/0x320
[  543.295805][T20929]  ? device_initialize+0x1d3/0x3e0
[  543.300886][T20929]  netdev_register_kobject+0x178/0x310
[  543.306316][T20929]  ? raw_notifier_call_chain+0xf2/0x110
[  543.311834][T20929]  register_netdevice+0xbc7/0x1480
[  543.316916][T20929]  ? netdev_update_lockdep_key+0x10/0x10
[  543.322537][T20929]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  543.327549][T20929]  ? __rcu_read_lock+0x50/0x50
[  543.332284][T20929]  ? alloc_netdev_mqs+0xa0c/0xc60
[  543.337277][T20929]  ? vti6_locate+0x551/0x910
[  543.341883][T20929]  vti6_locate+0x610/0x910
[  543.346329][T20929]  ? cap_capable+0x23f/0x280
[  543.350899][T20929]  ? vti6_link_config+0x530/0x530
[  543.355950][T20929]  ? vti6_ioctl+0xa64/0x1b10
[  543.360518][T20929]  vti6_ioctl+0xa88/0x1b10
[  543.364908][T20929]  ? vti6_tnl_xmit+0x1720/0x1720
[  543.369835][T20929]  ? __rcu_read_lock+0x50/0x50
[  543.374589][T20929]  ? check_preemption_disabled+0x154/0x330
[  543.380367][T20929]  ? avc_has_extended_perms+0xb5e/0x1140
[  543.385986][T20929]  ? full_name_hash+0xb4/0xe0
[  543.390634][T20929]  dev_ifsioc+0x675/0xa70
[  543.394935][T20929]  ? mutex_lock+0xa6/0x110
[  543.399328][T20929]  ? dev_ioctl+0xab0/0xab0
[  543.403712][T20929]  dev_ioctl+0x558/0xab0
[  543.407925][T20929]  sock_ioctl+0x677/0x760
[  543.412226][T20929]  ? sock_poll+0x2f0/0x2f0
[  543.416628][T20929]  ? memset+0x1f/0x40
[  543.420582][T20929]  ? fsnotify+0x1332/0x13f0
[  543.425055][T20929]  ? sock_poll+0x2f0/0x2f0
[  543.429441][T20929]  do_vfs_ioctl+0x76a/0x1720
[  543.434004][T20929]  ? selinux_file_ioctl+0x72f/0x990
[  543.439197][T20929]  ? ioctl_preallocate+0x250/0x250
[  543.444299][T20929]  ? __fget+0x37b/0x3c0
[  543.448428][T20929]  ? vfs_write+0x422/0x4e0
[  543.452812][T20929]  ? fget_many+0x20/0x20
[  543.457024][T20929]  ? debug_smp_processor_id+0x20/0x20
[  543.462384][T20929]  ? security_file_ioctl+0x9d/0xb0
[  543.467465][T20929]  __x64_sys_ioctl+0xd4/0x110
[  543.472134][T20929]  do_syscall_64+0xcb/0x1e0
[  543.476610][T20929]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  543.482473][T20929] RIP: 0033:0x466459
21:32:28 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x20000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:28 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7a], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:28 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

[  543.486339][T20929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  543.505913][T20929] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  543.514296][T20929] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  543.522238][T20929] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  543.532021][T20929] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  543.539980][T20929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:32:28 executing program 0 (fault-call:8 fault-nth:67):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  543.547944][T20929] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  543.587388][T20936] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:28 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x1f8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  543.602995][T20947] FAULT_INJECTION: forcing a failure.
[  543.602995][T20947] name failslab, interval 1, probability 0, space 0, times 0
[  543.604693][T20950] x_tables: duplicate underflow at hook 2
[  543.616876][T20947] CPU: 0 PID: 20947 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  543.631406][T20948] xt_SECMARK: invalid mode: 0
[  543.631588][T20947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  543.631592][T20947] Call Trace:
[  543.631618][T20947]  dump_stack+0x1d8/0x24e
[  543.638744][T20951] xt_SECMARK: invalid mode: 0
[  543.646322][T20947]  ? devkmsg_release+0x11c/0x11c
[  543.646335][T20947]  ? show_regs_print_info+0x12/0x12
[  543.646346][T20947]  should_fail+0x6f6/0x860
[  543.646354][T20947]  ? setup_fault_attr+0x3d0/0x3d0
[  543.646368][T20947]  ? security_kernfs_init_security+0x9a/0xb0
[  543.646385][T20947]  ? __kernfs_new_node+0x50b/0x6d0
[  543.689196][T20947]  ? __kernfs_new_node+0xdb/0x6d0
[  543.694196][T20947]  should_failslab+0x5/0x20
[  543.698675][T20947]  kmem_cache_alloc+0x36/0x290
[  543.703424][T20947]  ? mutex_trylock+0xb0/0xb0
[  543.708105][T20947]  __kernfs_new_node+0xdb/0x6d0
[  543.712943][T20947]  ? kernfs_new_node+0x160/0x160
[  543.717970][T20947]  ? mutex_unlock+0x19/0x40
[  543.722450][T20947]  ? kernfs_add_one+0x49e/0x5c0
[  543.727279][T20947]  ? __kernfs_create_file+0x1f1/0x260
[  543.732629][T20947]  kernfs_new_node+0x95/0x160
[  543.737279][T20947]  __kernfs_create_file+0x45/0x260
[  543.742365][T20947]  sysfs_add_file_mode_ns+0x293/0x340
[  543.747710][T20947]  sysfs_create_file_ns+0x18c/0x2b0
[  543.752883][T20947]  ? sysfs_add_file_mode_ns+0x340/0x340
[  543.758404][T20947]  ? device_create_file+0xe2/0x1a0
[  543.763498][T20947]  device_add+0xc44/0x18a0
[  543.767902][T20947]  ? virtual_device_parent+0x50/0x50
[  543.773162][T20947]  ? pm_runtime_init+0x206/0x320
[  543.778073][T20947]  ? device_initialize+0x1d3/0x3e0
[  543.783161][T20947]  netdev_register_kobject+0x178/0x310
[  543.788617][T20947]  ? raw_notifier_call_chain+0xf2/0x110
[  543.794136][T20947]  register_netdevice+0xbc7/0x1480
[  543.799221][T20947]  ? netdev_update_lockdep_key+0x10/0x10
[  543.804836][T20947]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  543.809836][T20947]  ? __rcu_read_lock+0x50/0x50
[  543.814580][T20947]  ? alloc_netdev_mqs+0xa0c/0xc60
[  543.819586][T20947]  ? vti6_locate+0x551/0x910
[  543.824169][T20947]  vti6_locate+0x610/0x910
[  543.828586][T20947]  ? cap_capable+0x23f/0x280
[  543.833152][T20947]  ? vti6_link_config+0x530/0x530
[  543.838153][T20947]  ? vti6_ioctl+0xa64/0x1b10
[  543.842746][T20947]  vti6_ioctl+0xa88/0x1b10
[  543.847153][T20947]  ? vti6_tnl_xmit+0x1720/0x1720
[  543.852079][T20947]  ? __rcu_read_lock+0x50/0x50
[  543.856823][T20947]  ? check_preemption_disabled+0x154/0x330
[  543.862619][T20947]  ? avc_has_extended_perms+0xb5e/0x1140
[  543.868232][T20947]  ? full_name_hash+0xb4/0xe0
[  543.872883][T20947]  dev_ifsioc+0x675/0xa70
[  543.877210][T20947]  ? mutex_lock+0xa6/0x110
[  543.881617][T20947]  ? dev_ioctl+0xab0/0xab0
[  543.886009][T20947]  dev_ioctl+0x558/0xab0
[  543.890229][T20947]  sock_ioctl+0x677/0x760
[  543.894530][T20947]  ? sock_poll+0x2f0/0x2f0
[  543.898923][T20947]  ? memset+0x1f/0x40
[  543.902882][T20947]  ? fsnotify+0x1332/0x13f0
[  543.907367][T20947]  ? sock_poll+0x2f0/0x2f0
[  543.911758][T20947]  do_vfs_ioctl+0x76a/0x1720
[  543.916330][T20947]  ? selinux_file_ioctl+0x72f/0x990
[  543.921521][T20947]  ? ioctl_preallocate+0x250/0x250
[  543.926637][T20947]  ? __fget+0x37b/0x3c0
[  543.930769][T20947]  ? vfs_write+0x422/0x4e0
[  543.935167][T20947]  ? fget_many+0x20/0x20
[  543.939409][T20947]  ? debug_smp_processor_id+0x20/0x20
[  543.944755][T20947]  ? security_file_ioctl+0x9d/0xb0
[  543.949847][T20947]  __x64_sys_ioctl+0xd4/0x110
[  543.954507][T20947]  do_syscall_64+0xcb/0x1e0
[  543.958991][T20947]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  543.964867][T20947] RIP: 0033:0x466459
[  543.968744][T20947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  543.988576][T20947] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  543.996965][T20947] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:29 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x25000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:29 executing program 0 (fault-call:8 fault-nth:68):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:29 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b14}, @mcast2}})

21:32:29 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000400900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:29 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x26020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  544.004922][T20947] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  544.012873][T20947] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  544.020839][T20947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  544.028786][T20947] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:29 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x300], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:29 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4a0], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:29 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x34010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  544.076017][T20960] x_tables: duplicate underflow at hook 2
[  544.085133][T20949] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096)
[  544.110504][T20964] EXT4-fs (loop1): Can't read superblock on 2nd try
[  544.122044][T20970] x_tables: duplicate underflow at hook 2
[  544.123859][T20966] FAULT_INJECTION: forcing a failure.
[  544.123859][T20966] name failslab, interval 1, probability 0, space 0, times 0
[  544.143179][T20966] CPU: 1 PID: 20966 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  544.153531][T20966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  544.163567][T20966] Call Trace:
[  544.166843][T20966]  dump_stack+0x1d8/0x24e
[  544.171155][T20966]  ? devkmsg_release+0x11c/0x11c
[  544.176069][T20966]  ? mutex_unlock+0x19/0x40
[  544.180548][T20966]  ? show_regs_print_info+0x12/0x12
[  544.185883][T20966]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  544.191937][T20966]  should_fail+0x6f6/0x860
[  544.196338][T20966]  ? setup_fault_attr+0x3d0/0x3d0
[  544.201347][T20966]  ? _raw_spin_lock+0xa3/0x1b0
[  544.206089][T20966]  ? __kernfs_new_node+0xdb/0x6d0
[  544.211121][T20966]  should_failslab+0x5/0x20
[  544.215604][T20966]  kmem_cache_alloc+0x36/0x290
[  544.220343][T20966]  __kernfs_new_node+0xdb/0x6d0
[  544.225175][T20966]  ? mutex_lock+0xa6/0x110
[  544.229582][T20966]  ? kernfs_new_node+0x160/0x160
[  544.234506][T20966]  ? make_kgid+0x24f/0x390
[  544.238909][T20966]  ? from_kuid_munged+0x3b0/0x3b0
[  544.243907][T20966]  ? kernfs_activate+0x3fc/0x420
[  544.248819][T20966]  kernfs_create_dir_ns+0x90/0x220
[  544.253998][T20966]  internal_create_group+0x294/0xf10
[  544.259278][T20966]  ? sysfs_create_group+0x20/0x20
[  544.265334][T20966]  ? sysfs_add_file_mode_ns+0x340/0x340
[  544.270863][T20966]  ? bus_add_device+0x92/0x3f0
[  544.275606][T20966]  dpm_sysfs_add+0x59/0x260
[  544.280127][T20966]  device_add+0xde7/0x18a0
[  544.284559][T20966]  ? virtual_device_parent+0x50/0x50
[  544.290014][T20966]  ? pm_runtime_init+0x206/0x320
[  544.294945][T20966]  ? device_initialize+0x1d3/0x3e0
[  544.300138][T20966]  netdev_register_kobject+0x178/0x310
[  544.305579][T20966]  ? raw_notifier_call_chain+0xf2/0x110
[  544.311117][T20966]  register_netdevice+0xbc7/0x1480
[  544.316215][T20966]  ? netdev_update_lockdep_key+0x10/0x10
[  544.321827][T20966]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  544.326867][T20966]  ? __rcu_read_lock+0x50/0x50
[  544.331623][T20966]  ? alloc_netdev_mqs+0xa0c/0xc60
[  544.336620][T20966]  ? vti6_locate+0x551/0x910
[  544.341181][T20966]  vti6_locate+0x610/0x910
[  544.345571][T20966]  ? cap_capable+0x23f/0x280
[  544.350169][T20966]  ? vti6_link_config+0x530/0x530
[  544.355172][T20966]  ? vti6_ioctl+0xa64/0x1b10
[  544.359734][T20966]  vti6_ioctl+0xa88/0x1b10
[  544.364125][T20966]  ? vti6_tnl_xmit+0x1720/0x1720
[  544.369059][T20966]  ? __rcu_read_lock+0x50/0x50
[  544.373796][T20966]  ? check_preemption_disabled+0x154/0x330
[  544.379612][T20966]  ? avc_has_extended_perms+0xb5e/0x1140
[  544.385243][T20966]  ? full_name_hash+0xb4/0xe0
[  544.389893][T20966]  dev_ifsioc+0x675/0xa70
[  544.394196][T20966]  ? mutex_lock+0xa6/0x110
[  544.398584][T20966]  ? dev_ioctl+0xab0/0xab0
[  544.402978][T20966]  dev_ioctl+0x558/0xab0
[  544.407195][T20966]  sock_ioctl+0x677/0x760
[  544.411502][T20966]  ? sock_poll+0x2f0/0x2f0
[  544.415891][T20966]  ? memset+0x1f/0x40
[  544.419846][T20966]  ? fsnotify+0x1332/0x13f0
[  544.424366][T20966]  ? sock_poll+0x2f0/0x2f0
[  544.428782][T20966]  do_vfs_ioctl+0x76a/0x1720
[  544.433393][T20966]  ? selinux_file_ioctl+0x72f/0x990
[  544.438567][T20966]  ? ioctl_preallocate+0x250/0x250
[  544.443651][T20966]  ? __fget+0x37b/0x3c0
[  544.447782][T20966]  ? vfs_write+0x422/0x4e0
[  544.452196][T20966]  ? fget_many+0x20/0x20
[  544.456412][T20966]  ? debug_smp_processor_id+0x20/0x20
[  544.461775][T20966]  ? security_file_ioctl+0x9d/0xb0
[  544.466860][T20966]  __x64_sys_ioctl+0xd4/0x110
[  544.471513][T20966]  do_syscall_64+0xcb/0x1e0
[  544.475991][T20966]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  544.481857][T20966] RIP: 0033:0x466459
[  544.485747][T20966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  544.505339][T20966] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  544.513721][T20966] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:29 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:29 executing program 0 (fault-call:8 fault-nth:69):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  544.521666][T20966] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  544.529609][T20966] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  544.537555][T20966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  544.545500][T20966] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  544.584597][T20976] FAULT_INJECTION: forcing a failure.
[  544.584597][T20976] name failslab, interval 1, probability 0, space 0, times 0
[  544.597257][T20976] CPU: 1 PID: 20976 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  544.607476][T20976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  544.617527][T20976] Call Trace:
[  544.620807][T20976]  dump_stack+0x1d8/0x24e
[  544.625160][T20976]  ? devkmsg_release+0x11c/0x11c
[  544.630078][T20976]  ? show_regs_print_info+0x12/0x12
[  544.635255][T20976]  should_fail+0x6f6/0x860
[  544.639646][T20976]  ? setup_fault_attr+0x3d0/0x3d0
[  544.644644][T20976]  ? security_kernfs_init_security+0x9a/0xb0
[  544.650594][T20976]  ? __kernfs_new_node+0x50b/0x6d0
[  544.655678][T20976]  ? __kernfs_new_node+0xdb/0x6d0
[  544.660689][T20976]  should_failslab+0x5/0x20
[  544.665175][T20976]  kmem_cache_alloc+0x36/0x290
[  544.669916][T20976]  ? mutex_trylock+0xb0/0xb0
[  544.674588][T20976]  __kernfs_new_node+0xdb/0x6d0
[  544.679412][T20976]  ? kernfs_new_node+0x160/0x160
[  544.684345][T20976]  ? mutex_unlock+0x19/0x40
[  544.688824][T20976]  ? kernfs_add_one+0x49e/0x5c0
[  544.693647][T20976]  ? __kernfs_create_file+0x1f1/0x260
[  544.698991][T20976]  kernfs_new_node+0x95/0x160
[  544.703642][T20976]  __kernfs_create_file+0x45/0x260
[  544.708727][T20976]  sysfs_add_file_mode_ns+0x293/0x340
[  544.714081][T20976]  sysfs_create_file_ns+0x18c/0x2b0
[  544.719253][T20976]  ? sysfs_add_file_mode_ns+0x340/0x340
[  544.724772][T20976]  ? device_create_file+0xe2/0x1a0
[  544.729854][T20976]  device_add+0xc44/0x18a0
[  544.734274][T20976]  ? virtual_device_parent+0x50/0x50
[  544.739541][T20976]  ? pm_runtime_init+0x206/0x320
[  544.744478][T20976]  ? device_initialize+0x1d3/0x3e0
[  544.749569][T20976]  netdev_register_kobject+0x178/0x310
[  544.755013][T20976]  ? raw_notifier_call_chain+0xf2/0x110
[  544.760559][T20976]  register_netdevice+0xbc7/0x1480
[  544.765651][T20976]  ? netdev_update_lockdep_key+0x10/0x10
[  544.771258][T20976]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  544.776255][T20976]  ? __rcu_read_lock+0x50/0x50
[  544.780991][T20976]  ? alloc_netdev_mqs+0xa0c/0xc60
[  544.785986][T20976]  ? vti6_locate+0x551/0x910
[  544.790549][T20976]  vti6_locate+0x610/0x910
[  544.794946][T20976]  ? cap_capable+0x23f/0x280
[  544.799522][T20976]  ? vti6_link_config+0x530/0x530
[  544.804521][T20976]  ? vti6_ioctl+0xa64/0x1b10
[  544.809086][T20976]  vti6_ioctl+0xa88/0x1b10
[  544.813501][T20976]  ? vti6_tnl_xmit+0x1720/0x1720
[  544.818415][T20976]  ? __rcu_read_lock+0x50/0x50
[  544.823155][T20976]  ? check_preemption_disabled+0x154/0x330
[  544.828945][T20976]  ? avc_has_extended_perms+0xb5e/0x1140
[  544.834686][T20976]  ? full_name_hash+0xb4/0xe0
[  544.839412][T20976]  dev_ifsioc+0x675/0xa70
[  544.843737][T20976]  ? mutex_lock+0xa6/0x110
[  544.848286][T20976]  ? dev_ioctl+0xab0/0xab0
[  544.852905][T20976]  dev_ioctl+0x558/0xab0
[  544.857184][T20976]  sock_ioctl+0x677/0x760
[  544.861494][T20976]  ? sock_poll+0x2f0/0x2f0
[  544.865936][T20976]  ? memset+0x1f/0x40
[  544.869895][T20976]  ? fsnotify+0x1332/0x13f0
[  544.874378][T20976]  ? sock_poll+0x2f0/0x2f0
[  544.878779][T20976]  do_vfs_ioctl+0x76a/0x1720
[  544.883345][T20976]  ? selinux_file_ioctl+0x72f/0x990
[  544.888528][T20976]  ? ioctl_preallocate+0x250/0x250
[  544.893795][T20976]  ? __fget+0x37b/0x3c0
[  544.897928][T20976]  ? vfs_write+0x422/0x4e0
[  544.902321][T20976]  ? fget_many+0x20/0x20
[  544.906539][T20976]  ? debug_smp_processor_id+0x20/0x20
[  544.911890][T20976]  ? security_file_ioctl+0x9d/0xb0
[  544.916986][T20976]  __x64_sys_ioctl+0xd4/0x110
[  544.921774][T20976]  do_syscall_64+0xcb/0x1e0
[  544.926364][T20976]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  544.932248][T20976] RIP: 0033:0x466459
[  544.936117][T20976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  544.955694][T20976] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  544.964079][T20976] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  544.972027][T20976] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:30 executing program 0 (fault-call:8 fault-nth:70):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:30 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b15}, @mcast2}})

[  544.979972][T20976] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  544.987916][T20976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  544.995861][T20976] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:30 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x36020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  545.036057][T20981] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  545.055739][T20986] FAULT_INJECTION: forcing a failure.
[  545.055739][T20986] name failslab, interval 1, probability 0, space 0, times 0
[  545.058731][T20989] x_tables: duplicate underflow at hook 2
[  545.069149][T20986] CPU: 1 PID: 20986 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  545.084462][T20986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  545.094557][T20986] Call Trace:
[  545.097833][T20986]  dump_stack+0x1d8/0x24e
[  545.102138][T20986]  ? devkmsg_release+0x11c/0x11c
[  545.107051][T20986]  ? show_regs_print_info+0x12/0x12
[  545.112246][T20986]  should_fail+0x6f6/0x860
[  545.116639][T20986]  ? setup_fault_attr+0x3d0/0x3d0
[  545.121656][T20986]  ? security_kernfs_init_security+0x9a/0xb0
[  545.127615][T20986]  ? __kernfs_new_node+0x50b/0x6d0
[  545.132703][T20986]  ? __kernfs_new_node+0xdb/0x6d0
[  545.137700][T20986]  should_failslab+0x5/0x20
[  545.142177][T20986]  kmem_cache_alloc+0x36/0x290
[  545.146916][T20986]  ? mutex_trylock+0xb0/0xb0
[  545.151506][T20986]  __kernfs_new_node+0xdb/0x6d0
[  545.156330][T20986]  ? kernfs_new_node+0x160/0x160
[  545.161249][T20986]  ? mutex_unlock+0x19/0x40
[  545.165727][T20986]  ? kernfs_add_one+0x49e/0x5c0
[  545.170552][T20986]  ? __kernfs_create_file+0x1f1/0x260
[  545.175894][T20986]  kernfs_new_node+0x95/0x160
[  545.180545][T20986]  __kernfs_create_file+0x45/0x260
[  545.185640][T20986]  sysfs_add_file_mode_ns+0x293/0x340
[  545.190994][T20986]  sysfs_create_file_ns+0x18c/0x2b0
[  545.196168][T20986]  ? sysfs_add_file_mode_ns+0x340/0x340
[  545.201691][T20986]  ? device_create_file+0xe2/0x1a0
[  545.206823][T20986]  device_add+0xc44/0x18a0
[  545.211228][T20986]  ? virtual_device_parent+0x50/0x50
[  545.216501][T20986]  ? pm_runtime_init+0x206/0x320
[  545.221409][T20986]  ? device_initialize+0x1d3/0x3e0
[  545.226496][T20986]  netdev_register_kobject+0x178/0x310
[  545.231931][T20986]  ? raw_notifier_call_chain+0xf2/0x110
[  545.237453][T20986]  register_netdevice+0xbc7/0x1480
[  545.242556][T20986]  ? netdev_update_lockdep_key+0x10/0x10
[  545.248168][T20986]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  545.253167][T20986]  ? __rcu_read_lock+0x50/0x50
[  545.257910][T20986]  ? alloc_netdev_mqs+0xa0c/0xc60
[  545.262914][T20986]  ? vti6_locate+0x551/0x910
[  545.267476][T20986]  vti6_locate+0x610/0x910
[  545.271868][T20986]  ? cap_capable+0x23f/0x280
[  545.276435][T20986]  ? vti6_link_config+0x530/0x530
[  545.281447][T20986]  ? vti6_ioctl+0xa64/0x1b10
[  545.286009][T20986]  vti6_ioctl+0xa88/0x1b10
[  545.290398][T20986]  ? vti6_tnl_xmit+0x1720/0x1720
[  545.295308][T20986]  ? __rcu_read_lock+0x50/0x50
[  545.300045][T20986]  ? check_preemption_disabled+0x154/0x330
[  545.305831][T20986]  ? avc_has_extended_perms+0xb5e/0x1140
[  545.311438][T20986]  ? full_name_hash+0xb4/0xe0
[  545.316088][T20986]  dev_ifsioc+0x675/0xa70
[  545.320389][T20986]  ? mutex_lock+0xa6/0x110
[  545.324775][T20986]  ? dev_ioctl+0xab0/0xab0
[  545.329162][T20986]  dev_ioctl+0x558/0xab0
[  545.333389][T20986]  sock_ioctl+0x677/0x760
[  545.337702][T20986]  ? sock_poll+0x2f0/0x2f0
[  545.342095][T20986]  ? memset+0x1f/0x40
[  545.346053][T20986]  ? fsnotify+0x1332/0x13f0
[  545.350546][T20986]  ? sock_poll+0x2f0/0x2f0
[  545.354956][T20986]  do_vfs_ioctl+0x76a/0x1720
[  545.359527][T20986]  ? selinux_file_ioctl+0x72f/0x990
[  545.364703][T20986]  ? ioctl_preallocate+0x250/0x250
[  545.369795][T20986]  ? __fget+0x37b/0x3c0
[  545.373928][T20986]  ? vfs_write+0x422/0x4e0
[  545.378321][T20986]  ? fget_many+0x20/0x20
[  545.382538][T20986]  ? debug_smp_processor_id+0x20/0x20
[  545.387885][T20986]  ? security_file_ioctl+0x9d/0xb0
[  545.392969][T20986]  __x64_sys_ioctl+0xd4/0x110
[  545.397620][T20986]  do_syscall_64+0xcb/0x1e0
[  545.402123][T20986]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  545.407990][T20986] RIP: 0033:0x466459
[  545.411874][T20986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
21:32:30 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000500900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:30 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x500], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:30 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:30 executing program 0 (fault-call:8 fault-nth:71):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  545.431455][T20986] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  545.439842][T20986] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  545.447789][T20986] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  545.455734][T20986] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  545.463678][T20986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  545.471623][T20986] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  545.525224][T21000] x_tables: duplicate underflow at hook 2
[  545.529055][T21003] FAULT_INJECTION: forcing a failure.
[  545.529055][T21003] name failslab, interval 1, probability 0, space 0, times 0
[  545.543739][T21003] CPU: 1 PID: 21003 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  545.553965][T21003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  545.564003][T21003] Call Trace:
[  545.567301][T21003]  dump_stack+0x1d8/0x24e
[  545.571615][T21003]  ? devkmsg_release+0x11c/0x11c
[  545.576530][T21003]  ? arch_stack_walk+0xf8/0x140
[  545.581363][T21003]  ? show_regs_print_info+0x12/0x12
[  545.586542][T21003]  should_fail+0x6f6/0x860
[  545.590938][T21003]  ? setup_fault_attr+0x3d0/0x3d0
[  545.595942][T21003]  ? stack_trace_save+0x120/0x1f0
[  545.600959][T21003]  ? radix_tree_node_alloc+0x18c/0x370
[  545.606410][T21003]  should_failslab+0x5/0x20
[  545.610893][T21003]  kmem_cache_alloc+0x36/0x290
[  545.615632][T21003]  ? __kasan_kmalloc+0x1a3/0x1e0
[  545.620565][T21003]  radix_tree_node_alloc+0x18c/0x370
[  545.625824][T21003]  ? dpm_sysfs_add+0xbd/0x260
[  545.630477][T21003]  ? device_add+0xde7/0x18a0
[  545.635043][T21003]  ? netdev_register_kobject+0x178/0x310
[  545.640650][T21003]  ? register_netdevice+0xbc7/0x1480
[  545.645912][T21003]  idr_get_free+0x2aa/0x900
[  545.650395][T21003]  idr_alloc_cyclic+0x1ef/0x5d0
[  545.655227][T21003]  ? idr_alloc+0x2f0/0x2f0
[  545.659629][T21003]  ? _raw_spin_lock+0xa3/0x1b0
[  545.664374][T21003]  __kernfs_new_node+0x122/0x6d0
[  545.669291][T21003]  ? kernfs_new_node+0x160/0x160
[  545.674207][T21003]  ? mutex_lock+0xa6/0x110
[  545.678598][T21003]  ? kernfs_activate+0x3fc/0x420
[  545.683510][T21003]  kernfs_new_node+0x95/0x160
[  545.688167][T21003]  __kernfs_create_file+0x45/0x260
[  545.693280][T21003]  sysfs_add_file_mode_ns+0x293/0x340
[  545.698642][T21003]  sysfs_merge_group+0x204/0x440
[  545.703562][T21003]  ? sysfs_remove_groups+0xb0/0xb0
[  545.708654][T21003]  ? sysfs_add_file_mode_ns+0x340/0x340
[  545.714184][T21003]  ? bus_add_device+0x92/0x3f0
[  545.718930][T21003]  dpm_sysfs_add+0xbd/0x260
[  545.723414][T21003]  device_add+0xde7/0x18a0
[  545.727809][T21003]  ? virtual_device_parent+0x50/0x50
[  545.733067][T21003]  ? pm_runtime_init+0x206/0x320
[  545.737984][T21003]  ? device_initialize+0x1d3/0x3e0
[  545.743072][T21003]  netdev_register_kobject+0x178/0x310
[  545.748508][T21003]  ? raw_notifier_call_chain+0xf2/0x110
[  545.754030][T21003]  register_netdevice+0xbc7/0x1480
[  545.759120][T21003]  ? netdev_update_lockdep_key+0x10/0x10
[  545.764727][T21003]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  545.769726][T21003]  ? __rcu_read_lock+0x50/0x50
[  545.774464][T21003]  ? alloc_netdev_mqs+0xa0c/0xc60
[  545.779463][T21003]  ? vti6_locate+0x551/0x910
[  545.784026][T21003]  vti6_locate+0x610/0x910
[  545.788419][T21003]  ? cap_capable+0x23f/0x280
[  545.792985][T21003]  ? vti6_link_config+0x530/0x530
[  545.797983][T21003]  ? vti6_ioctl+0xa64/0x1b10
[  545.802549][T21003]  vti6_ioctl+0xa88/0x1b10
[  545.806942][T21003]  ? vti6_tnl_xmit+0x1720/0x1720
[  545.811873][T21003]  ? __rcu_read_lock+0x50/0x50
[  545.816617][T21003]  ? check_preemption_disabled+0x154/0x330
[  545.822426][T21003]  ? avc_has_extended_perms+0xb5e/0x1140
[  545.828040][T21003]  ? full_name_hash+0xb4/0xe0
[  545.832697][T21003]  dev_ifsioc+0x675/0xa70
[  545.837004][T21003]  ? mutex_lock+0x106/0x110
[  545.841480][T21003]  ? dev_ioctl+0xab0/0xab0
[  545.845870][T21003]  dev_ioctl+0x558/0xab0
[  545.850088][T21003]  sock_ioctl+0x677/0x760
[  545.854394][T21003]  ? sock_poll+0x2f0/0x2f0
[  545.858801][T21003]  ? memset+0x1f/0x40
[  545.862761][T21003]  ? fsnotify+0x1332/0x13f0
[  545.867239][T21003]  ? sock_poll+0x2f0/0x2f0
[  545.871642][T21003]  do_vfs_ioctl+0x76a/0x1720
[  545.876223][T21003]  ? selinux_file_ioctl+0x72f/0x990
[  545.881411][T21003]  ? ioctl_preallocate+0x250/0x250
[  545.886503][T21003]  ? __fget+0x37b/0x3c0
[  545.890635][T21003]  ? vfs_write+0x422/0x4e0
[  545.895044][T21003]  ? fget_many+0x20/0x20
[  545.899285][T21003]  ? debug_smp_processor_id+0x20/0x20
[  545.904790][T21003]  ? security_file_ioctl+0x9d/0xb0
[  545.909885][T21003]  __x64_sys_ioctl+0xd4/0x110
[  545.914557][T21003]  do_syscall_64+0xcb/0x1e0
[  545.919041][T21003]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
21:32:31 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x5c0], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  545.924913][T21003] RIP: 0033:0x466459
[  545.928785][T21003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  545.948367][T21003] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  545.956769][T21003] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  545.964716][T21003] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:31 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x40000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:31 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b16}, @mcast2}})

21:32:31 executing program 0 (fault-call:8 fault-nth:72):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  545.972669][T21003] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  545.980634][T21003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  545.988601][T21003] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  546.017339][T21001] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
21:32:31 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:31 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x40010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:31 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x600], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  546.026584][T20997] EXT4-fs (loop1): Can't read superblock on 2nd try
[  546.042619][T21009] x_tables: duplicate underflow at hook 2
[  546.117239][T21017] FAULT_INJECTION: forcing a failure.
[  546.117239][T21017] name failslab, interval 1, probability 0, space 0, times 0
[  546.130091][T21017] CPU: 0 PID: 21017 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  546.140308][T21017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  546.150342][T21017] Call Trace:
[  546.153618][T21017]  dump_stack+0x1d8/0x24e
[  546.157931][T21017]  ? devkmsg_release+0x11c/0x11c
[  546.162844][T21017]  ? mutex_unlock+0x19/0x40
[  546.167325][T21017]  ? show_regs_print_info+0x12/0x12
[  546.172507][T21017]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  546.178650][T21017]  should_fail+0x6f6/0x860
[  546.183047][T21017]  ? setup_fault_attr+0x3d0/0x3d0
[  546.188050][T21017]  ? _raw_spin_lock+0xa3/0x1b0
[  546.192810][T21017]  ? __kernfs_new_node+0xdb/0x6d0
[  546.197814][T21017]  should_failslab+0x5/0x20
[  546.202291][T21017]  kmem_cache_alloc+0x36/0x290
[  546.207032][T21017]  __kernfs_new_node+0xdb/0x6d0
[  546.211857][T21017]  ? mutex_lock+0xa6/0x110
[  546.216245][T21017]  ? kernfs_new_node+0x160/0x160
[  546.221165][T21017]  ? mutex_lock+0xa6/0x110
[  546.225584][T21017]  ? kernfs_activate+0x3fc/0x420
[  546.230497][T21017]  kernfs_new_node+0x95/0x160
[  546.235158][T21017]  __kernfs_create_file+0x45/0x260
[  546.240270][T21017]  sysfs_add_file_mode_ns+0x293/0x340
[  546.245638][T21017]  sysfs_merge_group+0x204/0x440
[  546.250566][T21017]  ? sysfs_remove_groups+0xb0/0xb0
[  546.255819][T21017]  ? sysfs_add_file_mode_ns+0x340/0x340
[  546.263101][T21017]  ? bus_add_device+0x92/0x3f0
[  546.267938][T21017]  dpm_sysfs_add+0xbd/0x260
[  546.272427][T21017]  device_add+0xde7/0x18a0
[  546.276827][T21017]  ? virtual_device_parent+0x50/0x50
[  546.282348][T21017]  ? pm_runtime_init+0x206/0x320
[  546.287281][T21017]  ? device_initialize+0x1d3/0x3e0
[  546.292551][T21017]  netdev_register_kobject+0x178/0x310
[  546.298005][T21017]  ? raw_notifier_call_chain+0xf2/0x110
[  546.303547][T21017]  register_netdevice+0xbc7/0x1480
[  546.308652][T21017]  ? netdev_update_lockdep_key+0x10/0x10
[  546.314265][T21017]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  546.319268][T21017]  ? __rcu_read_lock+0x50/0x50
[  546.324002][T21017]  ? alloc_netdev_mqs+0xa0c/0xc60
[  546.329017][T21017]  ? vti6_locate+0x551/0x910
[  546.333602][T21017]  vti6_locate+0x610/0x910
[  546.338002][T21017]  ? cap_capable+0x23f/0x280
[  546.342572][T21017]  ? vti6_link_config+0x530/0x530
[  546.347580][T21017]  ? vti6_ioctl+0xa64/0x1b10
[  546.352142][T21017]  vti6_ioctl+0xa88/0x1b10
[  546.356549][T21017]  ? vti6_tnl_xmit+0x1720/0x1720
[  546.361479][T21017]  ? avc_has_extended_perms+0xb5e/0x1140
[  546.367088][T21017]  ? full_name_hash+0xb4/0xe0
[  546.371741][T21017]  dev_ifsioc+0x675/0xa70
[  546.376047][T21017]  ? mutex_lock+0x106/0x110
[  546.380526][T21017]  ? dev_ioctl+0xab0/0xab0
[  546.384927][T21017]  dev_ioctl+0x558/0xab0
[  546.389180][T21017]  sock_ioctl+0x677/0x760
[  546.393494][T21017]  ? sock_poll+0x2f0/0x2f0
[  546.397897][T21017]  ? memset+0x1f/0x40
[  546.401957][T21017]  ? fsnotify+0x1332/0x13f0
[  546.406434][T21017]  ? sock_poll+0x2f0/0x2f0
[  546.410830][T21017]  do_vfs_ioctl+0x76a/0x1720
[  546.415415][T21017]  ? selinux_file_ioctl+0x72f/0x990
[  546.420605][T21017]  ? ioctl_preallocate+0x250/0x250
[  546.425689][T21017]  ? __fget+0x37b/0x3c0
[  546.429818][T21017]  ? vfs_write+0x422/0x4e0
[  546.434210][T21017]  ? fget_many+0x20/0x20
[  546.438467][T21017]  ? debug_smp_processor_id+0x20/0x20
[  546.443814][T21017]  ? security_file_ioctl+0x9d/0xb0
[  546.448923][T21017]  __x64_sys_ioctl+0xd4/0x110
[  546.453577][T21017]  do_syscall_64+0xcb/0x1e0
[  546.458080][T21017]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  546.463942][T21017] RIP: 0033:0x466459
[  546.467808][T21017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  546.487385][T21017] RSP: 002b:00007faa9aa7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  546.495786][T21017] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459
[  546.503805][T21017] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:31 executing program 0 (fault-call:8 fault-nth:73):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  546.511767][T21017] RBP: 00007faa9aa7f1d0 R08: 0000000000000000 R09: 0000000000000000
[  546.519714][T21017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  546.527658][T21017] R13: 00007ffe4ada44ff R14: 00007faa9aa7f300 R15: 0000000000022000
[  546.559131][T21019] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  546.566009][T21021] EXT4-fs (loop1): Can't read superblock on 2nd try
[  546.588040][T21027] x_tables: duplicate underflow at hook 2
[  546.607420][T21030] FAULT_INJECTION: forcing a failure.
[  546.607420][T21030] name failslab, interval 1, probability 0, space 0, times 0
[  546.620222][T21030] CPU: 1 PID: 21030 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  546.630547][T21030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  546.640686][T21030] Call Trace:
[  546.643968][T21030]  dump_stack+0x1d8/0x24e
[  546.648277][T21030]  ? devkmsg_release+0x11c/0x11c
[  546.653191][T21030]  ? mutex_unlock+0x19/0x40
[  546.657671][T21030]  ? show_regs_print_info+0x12/0x12
[  546.662850][T21030]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  546.668899][T21030]  should_fail+0x6f6/0x860
[  546.673289][T21030]  ? setup_fault_attr+0x3d0/0x3d0
[  546.678287][T21030]  ? _raw_spin_lock+0xa3/0x1b0
[  546.683024][T21030]  ? __kernfs_new_node+0xdb/0x6d0
[  546.688020][T21030]  should_failslab+0x5/0x20
[  546.692499][T21030]  kmem_cache_alloc+0x36/0x290
[  546.697238][T21030]  __kernfs_new_node+0xdb/0x6d0
[  546.702064][T21030]  ? mutex_lock+0xa6/0x110
[  546.706469][T21030]  ? kernfs_new_node+0x160/0x160
[  546.711396][T21030]  ? mutex_lock+0xa6/0x110
[  546.715785][T21030]  ? kernfs_activate+0x3fc/0x420
[  546.720711][T21030]  kernfs_new_node+0x95/0x160
[  546.725361][T21030]  __kernfs_create_file+0x45/0x260
[  546.730461][T21030]  sysfs_add_file_mode_ns+0x293/0x340
[  546.735820][T21030]  sysfs_merge_group+0x204/0x440
[  546.740729][T21030]  ? sysfs_remove_groups+0xb0/0xb0
[  546.745811][T21030]  ? sysfs_add_file_mode_ns+0x340/0x340
[  546.751335][T21030]  ? bus_add_device+0x92/0x3f0
[  546.756079][T21030]  dpm_sysfs_add+0xbd/0x260
[  546.760562][T21030]  device_add+0xde7/0x18a0
[  546.764954][T21030]  ? virtual_device_parent+0x50/0x50
[  546.770217][T21030]  ? pm_runtime_init+0x206/0x320
[  546.775127][T21030]  ? device_initialize+0x1d3/0x3e0
[  546.780248][T21030]  netdev_register_kobject+0x178/0x310
[  546.785682][T21030]  ? raw_notifier_call_chain+0xf2/0x110
[  546.791226][T21030]  register_netdevice+0xbc7/0x1480
[  546.796312][T21030]  ? netdev_update_lockdep_key+0x10/0x10
[  546.801918][T21030]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  546.806923][T21030]  ? __rcu_read_lock+0x50/0x50
[  546.811665][T21030]  ? alloc_netdev_mqs+0xa0c/0xc60
[  546.816669][T21030]  ? vti6_locate+0x551/0x910
[  546.821235][T21030]  vti6_locate+0x610/0x910
[  546.825624][T21030]  ? cap_capable+0x23f/0x280
[  546.830187][T21030]  ? vti6_link_config+0x530/0x530
[  546.835204][T21030]  ? vti6_ioctl+0xa64/0x1b10
[  546.839768][T21030]  vti6_ioctl+0xa88/0x1b10
[  546.844157][T21030]  ? vti6_tnl_xmit+0x1720/0x1720
[  546.849096][T21030]  ? __rcu_read_lock+0x50/0x50
[  546.853843][T21030]  ? check_preemption_disabled+0x154/0x330
[  546.859624][T21030]  ? avc_has_extended_perms+0xb5e/0x1140
[  546.865228][T21030]  ? full_name_hash+0xb4/0xe0
[  546.869897][T21030]  dev_ifsioc+0x675/0xa70
[  546.874210][T21030]  ? mutex_lock+0xa6/0x110
[  546.878622][T21030]  ? dev_ioctl+0xab0/0xab0
[  546.883139][T21030]  dev_ioctl+0x558/0xab0
[  546.887362][T21030]  sock_ioctl+0x677/0x760
[  546.891676][T21030]  ? sock_poll+0x2f0/0x2f0
[  546.896074][T21030]  ? memset+0x1f/0x40
[  546.900032][T21030]  ? fsnotify+0x1332/0x13f0
[  546.904514][T21030]  ? sock_poll+0x2f0/0x2f0
[  546.908904][T21030]  do_vfs_ioctl+0x76a/0x1720
[  546.913475][T21030]  ? selinux_file_ioctl+0x72f/0x990
[  546.918647][T21030]  ? ioctl_preallocate+0x250/0x250
[  546.923873][T21030]  ? __fget+0x37b/0x3c0
[  546.928067][T21030]  ? vfs_write+0x422/0x4e0
[  546.932460][T21030]  ? fget_many+0x20/0x20
[  546.936676][T21030]  ? debug_smp_processor_id+0x20/0x20
[  546.942036][T21030]  ? security_file_ioctl+0x9d/0xb0
[  546.947134][T21030]  __x64_sys_ioctl+0xd4/0x110
[  546.951842][T21030]  do_syscall_64+0xcb/0x1e0
[  546.956426][T21030]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  546.962295][T21030] RIP: 0033:0x466459
[  546.966165][T21030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  546.985743][T21030] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  546.994126][T21030] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  547.002069][T21030] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:32 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000600900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:32 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b17}, @mcast2}})

21:32:32 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:32 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x48000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:32 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x700], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:32 executing program 0 (fault-call:8 fault-nth:74):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:32 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x900], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  547.010013][T21030] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  547.017958][T21030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  547.025903][T21030] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:32 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

[  547.059313][T21036] x_tables: duplicate underflow at hook 2
[  547.074288][T21038] secmark_tg_check: 12 callbacks suppressed
[  547.074293][T21038] xt_SECMARK: invalid mode: 0
[  547.096349][T21039] FAULT_INJECTION: forcing a failure.
[  547.096349][T21039] name failslab, interval 1, probability 0, space 0, times 0
21:32:32 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xa00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:32 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x4c000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  547.097151][T21044] x_tables: duplicate underflow at hook 2
[  547.124224][T21046] xt_SECMARK: invalid mode: 0
[  547.131175][T21039] CPU: 1 PID: 21039 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  547.141425][T21039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  547.151578][T21039] Call Trace:
[  547.154897][T21039]  dump_stack+0x1d8/0x24e
[  547.159202][T21039]  ? devkmsg_release+0x11c/0x11c
[  547.164124][T21039]  ? show_regs_print_info+0x12/0x12
[  547.169300][T21039]  ? __schedule+0x9b8/0x1170
[  547.173872][T21039]  should_fail+0x6f6/0x860
[  547.178271][T21039]  ? setup_fault_attr+0x3d0/0x3d0
[  547.183272][T21039]  ? __kernfs_new_node+0xdb/0x6d0
[  547.188269][T21039]  should_failslab+0x5/0x20
[  547.192756][T21039]  kmem_cache_alloc+0x36/0x290
[  547.197531][T21039]  __kernfs_new_node+0xdb/0x6d0
[  547.202364][T21039]  ? mutex_lock+0xa6/0x110
[  547.206758][T21039]  ? kernfs_new_node+0x160/0x160
[  547.211721][T21039]  ? kernfs_link_sibling+0x2ce/0x350
[  547.217024][T21039]  ? asan.module_dtor+0x20/0x20
[  547.221855][T21039]  ? kernfs_activate+0x3fc/0x420
[  547.226789][T21039]  kernfs_new_node+0x95/0x160
[  547.231443][T21039]  __kernfs_create_file+0x45/0x260
[  547.236529][T21039]  sysfs_add_file_mode_ns+0x293/0x340
[  547.241877][T21039]  sysfs_merge_group+0x204/0x440
[  547.246789][T21039]  ? sysfs_remove_groups+0xb0/0xb0
[  547.251878][T21039]  ? sysfs_add_file_mode_ns+0x340/0x340
[  547.257401][T21039]  ? bus_add_device+0x92/0x3f0
[  547.262249][T21039]  dpm_sysfs_add+0xbd/0x260
[  547.266735][T21039]  device_add+0xde7/0x18a0
[  547.271306][T21039]  ? virtual_device_parent+0x50/0x50
[  547.276575][T21039]  ? pm_runtime_init+0x206/0x320
[  547.281494][T21039]  ? device_initialize+0x1d3/0x3e0
[  547.286591][T21039]  netdev_register_kobject+0x178/0x310
[  547.292028][T21039]  ? raw_notifier_call_chain+0xf2/0x110
[  547.297555][T21039]  register_netdevice+0xbc7/0x1480
[  547.302641][T21039]  ? netdev_update_lockdep_key+0x10/0x10
[  547.308247][T21039]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  547.313246][T21039]  ? __rcu_read_lock+0x50/0x50
[  547.317984][T21039]  ? alloc_netdev_mqs+0xa0c/0xc60
[  547.323067][T21039]  ? vti6_locate+0x551/0x910
[  547.327630][T21039]  vti6_locate+0x610/0x910
[  547.332023][T21039]  ? cap_capable+0x23f/0x280
[  547.336602][T21039]  ? vti6_link_config+0x530/0x530
[  547.341645][T21039]  ? vti6_ioctl+0xa64/0x1b10
[  547.346223][T21039]  vti6_ioctl+0xa88/0x1b10
[  547.350621][T21039]  ? vti6_tnl_xmit+0x1720/0x1720
[  547.355537][T21039]  ? __rcu_read_lock+0x50/0x50
[  547.360279][T21039]  ? check_preemption_disabled+0x154/0x330
[  547.366067][T21039]  ? avc_has_extended_perms+0xb5e/0x1140
[  547.371682][T21039]  ? full_name_hash+0xb4/0xe0
[  547.376334][T21039]  dev_ifsioc+0x675/0xa70
[  547.380653][T21039]  ? mutex_lock+0xa6/0x110
[  547.385081][T21039]  ? dev_ioctl+0xab0/0xab0
[  547.389472][T21039]  dev_ioctl+0x558/0xab0
[  547.393688][T21039]  sock_ioctl+0x677/0x760
[  547.397991][T21039]  ? sock_poll+0x2f0/0x2f0
[  547.402380][T21039]  ? memset+0x1f/0x40
[  547.406335][T21039]  ? fsnotify+0x1332/0x13f0
[  547.410808][T21039]  ? sock_poll+0x2f0/0x2f0
[  547.415201][T21039]  do_vfs_ioctl+0x76a/0x1720
[  547.419767][T21039]  ? selinux_file_ioctl+0x72f/0x990
[  547.424936][T21039]  ? ioctl_preallocate+0x250/0x250
[  547.430034][T21039]  ? __fget+0x37b/0x3c0
[  547.434169][T21039]  ? vfs_write+0x422/0x4e0
[  547.438575][T21039]  ? fget_many+0x20/0x20
[  547.442809][T21039]  ? debug_smp_processor_id+0x20/0x20
[  547.448153][T21039]  ? security_file_ioctl+0x9d/0xb0
[  547.453235][T21039]  __x64_sys_ioctl+0xd4/0x110
[  547.457885][T21039]  do_syscall_64+0xcb/0x1e0
[  547.462377][T21039]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  547.468242][T21039] RIP: 0033:0x466459
[  547.472109][T21039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  547.491683][T21039] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  547.500180][T21039] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:32 executing program 0 (fault-call:8 fault-nth:75):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  547.508127][T21039] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  547.516088][T21039] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  547.524054][T21039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  547.532009][T21039] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:32 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b18}, @mcast2}})

[  547.579502][T21045] EXT4-fs (loop1): Can't read superblock on 2nd try
[  547.588219][T21054] xt_SECMARK: invalid mode: 0
[  547.600439][T21049] FAULT_INJECTION: forcing a failure.
[  547.600439][T21049] name failslab, interval 1, probability 0, space 0, times 0
[  547.617518][T21056] xt_SECMARK: invalid mode: 0
[  547.634692][T21049] CPU: 1 PID: 21049 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  547.644950][T21049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  547.655034][T21049] Call Trace:
[  547.658333][T21049]  dump_stack+0x1d8/0x24e
[  547.662669][T21049]  ? devkmsg_release+0x11c/0x11c
[  547.667611][T21049]  ? show_regs_print_info+0x12/0x12
[  547.672807][T21049]  should_fail+0x6f6/0x860
[  547.677223][T21049]  ? setup_fault_attr+0x3d0/0x3d0
[  547.682249][T21049]  ? kzalloc+0x1d/0x30
[  547.686317][T21049]  should_failslab+0x5/0x20
[  547.690819][T21049]  __kmalloc+0x5f/0x2f0
[  547.694970][T21049]  ? kobject_uevent_env+0x252/0x1040
[  547.700246][T21049]  kzalloc+0x1d/0x30
[  547.704136][T21049]  kobject_get_path+0xb3/0x190
[  547.708893][T21049]  kobject_uevent_env+0x269/0x1040
[  547.713999][T21049]  device_add+0xf42/0x18a0
[  547.718417][T21049]  ? virtual_device_parent+0x50/0x50
[  547.723690][T21049]  ? pm_runtime_init+0x206/0x320
[  547.728726][T21049]  ? device_initialize+0x1d3/0x3e0
[  547.733835][T21049]  netdev_register_kobject+0x178/0x310
[  547.739291][T21049]  ? raw_notifier_call_chain+0xf2/0x110
[  547.744836][T21049]  register_netdevice+0xbc7/0x1480
[  547.749954][T21049]  ? netdev_update_lockdep_key+0x10/0x10
[  547.755589][T21049]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  547.760612][T21049]  ? __rcu_read_lock+0x50/0x50
[  547.765375][T21049]  ? alloc_netdev_mqs+0xa0c/0xc60
[  547.770395][T21049]  ? vti6_locate+0x551/0x910
[  547.774983][T21049]  vti6_locate+0x610/0x910
[  547.779404][T21049]  ? cap_capable+0x23f/0x280
[  547.783993][T21049]  ? vti6_link_config+0x530/0x530
[  547.789025][T21049]  ? vti6_ioctl+0xa64/0x1b10
[  547.793614][T21049]  vti6_ioctl+0xa88/0x1b10
[  547.798036][T21049]  ? vti6_tnl_xmit+0x1720/0x1720
[  547.802968][T21049]  ? __rcu_read_lock+0x50/0x50
[  547.807728][T21049]  ? check_preemption_disabled+0x154/0x330
[  547.813530][T21049]  ? avc_has_extended_perms+0xb5e/0x1140
[  547.819157][T21049]  ? full_name_hash+0xb4/0xe0
[  547.823829][T21049]  dev_ifsioc+0x675/0xa70
[  547.828158][T21049]  ? mutex_lock+0xa6/0x110
[  547.832572][T21049]  ? dev_ioctl+0xab0/0xab0
[  547.836987][T21049]  dev_ioctl+0x558/0xab0
[  547.841235][T21049]  sock_ioctl+0x677/0x760
[  547.845565][T21049]  ? sock_poll+0x2f0/0x2f0
[  547.849979][T21049]  ? memset+0x1f/0x40
[  547.853965][T21049]  ? fsnotify+0x1332/0x13f0
[  547.858463][T21049]  ? sock_poll+0x2f0/0x2f0
[  547.862893][T21049]  do_vfs_ioctl+0x76a/0x1720
[  547.869045][T21049]  ? selinux_file_ioctl+0x72f/0x990
[  547.874241][T21049]  ? ioctl_preallocate+0x250/0x250
[  547.879348][T21049]  ? __fget+0x37b/0x3c0
[  547.883507][T21049]  ? vfs_write+0x422/0x4e0
[  547.887923][T21049]  ? fget_many+0x20/0x20
[  547.892166][T21049]  ? debug_smp_processor_id+0x20/0x20
[  547.897536][T21049]  ? security_file_ioctl+0x9d/0xb0
[  547.902656][T21049]  __x64_sys_ioctl+0xd4/0x110
[  547.907336][T21049]  do_syscall_64+0xcb/0x1e0
[  547.911842][T21049]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  547.917734][T21049] RIP: 0033:0x466459
[  547.921624][T21049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  547.941221][T21049] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  547.949626][T21049] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  547.957595][T21049] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  547.965562][T21049] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  547.973527][T21049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  547.981494][T21049] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  548.043631][T21058] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:33 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000700900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:33 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xb00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:33 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x58030000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:33 executing program 0 (fault-call:8 fault-nth:76):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:33 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b19}, @mcast2}})

21:32:33 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:33 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xc00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:33 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x5a010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  548.198448][T21075] xt_check_table_hooks: 1 callbacks suppressed
[  548.198455][T21075] x_tables: duplicate underflow at hook 2
[  548.198521][T21076] xt_SECMARK: invalid mode: 0
[  548.235809][T21078] xt_SECMARK: invalid mode: 0
[  548.255112][T21073] FAULT_INJECTION: forcing a failure.
[  548.255112][T21073] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[  548.270254][T21073] CPU: 0 PID: 21073 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  548.280531][T21073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  548.290581][T21073] Call Trace:
[  548.293873][T21073]  dump_stack+0x1d8/0x24e
[  548.298196][T21073]  ? devkmsg_release+0x11c/0x11c
[  548.303132][T21073]  ? show_regs_print_info+0x12/0x12
[  548.308325][T21073]  should_fail+0x6f6/0x860
[  548.312736][T21073]  ? setup_fault_attr+0x3d0/0x3d0
[  548.317749][T21073]  ? stack_trace_save+0x120/0x1f0
[  548.322766][T21073]  __alloc_pages_nodemask+0x1c4/0x880
[  548.328128][T21073]  ? __kasan_kmalloc+0x137/0x1e0
[  548.333066][T21073]  ? __kernfs_create_file+0x45/0x260
[  548.338349][T21073]  ? gfp_pfmemalloc_allowed+0x120/0x120
[  548.343888][T21073]  ? mutex_lock+0xa6/0x110
[  548.348297][T21073]  ? idr_get_free+0x740/0x900
[  548.352966][T21073]  ? mutex_unlock+0x19/0x40
[  548.357463][T21073]  alloc_slab_page+0x39/0x3e0
[  548.362131][T21073]  new_slab+0x97/0x460
[  548.366193][T21073]  ? selinux_path_notify+0x6c0/0x6c0
[  548.371472][T21073]  ? check_preemption_disabled+0x154/0x330
[  548.377270][T21073]  ___slab_alloc+0x330/0x4c0
[  548.381859][T21073]  ? _raw_spin_lock+0xa3/0x1b0
[  548.386616][T21073]  ? __kernfs_new_node+0xdb/0x6d0
[  548.391637][T21073]  ? __kernfs_new_node+0xdb/0x6d0
[  548.396658][T21073]  kmem_cache_alloc+0x18b/0x290
[  548.401504][T21073]  __kernfs_new_node+0xdb/0x6d0
[  548.406356][T21073]  ? mutex_lock+0xa6/0x110
[  548.410766][T21073]  ? kernfs_new_node+0x160/0x160
[  548.415694][T21073]  ? mutex_lock+0xa6/0x110
[  548.420105][T21073]  ? kernfs_activate+0x3fc/0x420
[  548.425034][T21073]  kernfs_new_node+0x95/0x160
[  548.429703][T21073]  __kernfs_create_file+0x45/0x260
[  548.434806][T21073]  sysfs_add_file_mode_ns+0x293/0x340
[  548.440174][T21073]  sysfs_merge_group+0x204/0x440
[  548.445105][T21073]  ? sysfs_remove_groups+0xb0/0xb0
[  548.450210][T21073]  ? sysfs_add_file_mode_ns+0x340/0x340
[  548.455748][T21073]  ? bus_add_device+0x92/0x3f0
[  548.460516][T21073]  dpm_sysfs_add+0xbd/0x260
[  548.465014][T21073]  device_add+0xde7/0x18a0
[  548.469423][T21073]  ? virtual_device_parent+0x50/0x50
[  548.474727][T21073]  ? pm_runtime_init+0x206/0x320
[  548.479657][T21073]  ? device_initialize+0x1d3/0x3e0
[  548.484762][T21073]  netdev_register_kobject+0x178/0x310
[  548.490217][T21073]  ? raw_notifier_call_chain+0xf2/0x110
[  548.496021][T21073]  register_netdevice+0xbc7/0x1480
[  548.501131][T21073]  ? netdev_update_lockdep_key+0x10/0x10
[  548.506758][T21073]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  548.511778][T21073]  ? __rcu_read_lock+0x50/0x50
[  548.516534][T21073]  ? alloc_netdev_mqs+0xa0c/0xc60
[  548.521648][T21073]  ? vti6_locate+0x551/0x910
[  548.526215][T21073]  vti6_locate+0x610/0x910
[  548.530608][T21073]  ? cap_capable+0x23f/0x280
[  548.535176][T21073]  ? vti6_link_config+0x530/0x530
[  548.540180][T21073]  ? vti6_ioctl+0xa64/0x1b10
[  548.544744][T21073]  vti6_ioctl+0xa88/0x1b10
[  548.549136][T21073]  ? vti6_tnl_xmit+0x1720/0x1720
[  548.554065][T21073]  ? __rcu_read_lock+0x50/0x50
[  548.558806][T21073]  ? check_preemption_disabled+0x154/0x330
[  548.564585][T21073]  ? avc_has_extended_perms+0xb5e/0x1140
[  548.570197][T21073]  ? full_name_hash+0xb4/0xe0
[  548.575203][T21073]  dev_ifsioc+0x675/0xa70
[  548.579511][T21073]  ? mutex_lock+0xa6/0x110
[  548.583915][T21073]  ? dev_ioctl+0xab0/0xab0
[  548.588302][T21073]  dev_ioctl+0x558/0xab0
[  548.592515][T21073]  sock_ioctl+0x677/0x760
[  548.596817][T21073]  ? sock_poll+0x2f0/0x2f0
[  548.601207][T21073]  ? memset+0x1f/0x40
[  548.605166][T21073]  ? fsnotify+0x1332/0x13f0
[  548.609641][T21073]  ? sock_poll+0x2f0/0x2f0
[  548.614049][T21073]  do_vfs_ioctl+0x76a/0x1720
[  548.618612][T21073]  ? selinux_file_ioctl+0x72f/0x990
[  548.623780][T21073]  ? ioctl_preallocate+0x250/0x250
[  548.628866][T21073]  ? __fget+0x37b/0x3c0
[  548.633017][T21073]  ? vfs_write+0x422/0x4e0
[  548.637406][T21073]  ? fget_many+0x20/0x20
[  548.641709][T21073]  ? debug_smp_processor_id+0x20/0x20
[  548.647055][T21073]  ? security_file_ioctl+0x9d/0xb0
[  548.652138][T21073]  __x64_sys_ioctl+0xd4/0x110
[  548.656789][T21073]  do_syscall_64+0xcb/0x1e0
[  548.661277][T21073]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  548.667140][T21073] RIP: 0033:0x466459
[  548.671008][T21073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  548.690584][T21073] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  548.698968][T21073] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:34 executing program 0 (fault-call:8 fault-nth:77):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:34 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, 0x0, 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:34 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1a}, @mcast2}})

21:32:34 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xd00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  548.706914][T21073] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  548.714880][T21073] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  548.722825][T21073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  548.730775][T21073] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  548.783676][T21090] xt_SECMARK: invalid mode: 0
[  548.786275][T21088] x_tables: duplicate underflow at hook 2
[  548.809671][T21097] xt_SECMARK: invalid mode: 0
[  548.826301][T21101] x_tables: duplicate underflow at hook 2
[  548.832459][T21089] EXT4-fs (loop1): Can't read superblock on 2nd try
[  548.843447][T21092] FAULT_INJECTION: forcing a failure.
[  548.843447][T21092] name failslab, interval 1, probability 0, space 0, times 0
[  548.846065][T21093] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  548.856266][T21092] CPU: 0 PID: 21092 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  548.875167][T21092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  548.885201][T21092] Call Trace:
[  548.888477][T21092]  dump_stack+0x1d8/0x24e
[  548.892787][T21092]  ? devkmsg_release+0x11c/0x11c
[  548.897719][T21092]  ? show_regs_print_info+0x12/0x12
[  548.902894][T21092]  should_fail+0x6f6/0x860
[  548.907285][T21092]  ? setup_fault_attr+0x3d0/0x3d0
[  548.912281][T21092]  ? alloc_uevent_skb+0x73/0x220
[  548.917214][T21092]  should_failslab+0x5/0x20
[  548.921690][T21092]  __kmalloc_track_caller+0x5d/0x2e0
[  548.926969][T21092]  ? kmem_cache_alloc+0x115/0x290
[  548.933278][T21092]  ? alloc_uevent_skb+0x73/0x220
[  548.938211][T21092]  __alloc_skb+0xaf/0x4d0
[  548.942536][T21092]  alloc_uevent_skb+0x73/0x220
[  548.947290][T21092]  kobject_uevent_env+0x972/0x1040
[  548.952377][T21092]  device_add+0xf42/0x18a0
[  548.956768][T21092]  ? virtual_device_parent+0x50/0x50
[  548.962035][T21092]  ? pm_runtime_init+0x206/0x320
[  548.966971][T21092]  ? device_initialize+0x1d3/0x3e0
[  548.972058][T21092]  netdev_register_kobject+0x178/0x310
[  548.977498][T21092]  ? raw_notifier_call_chain+0xf2/0x110
[  548.983021][T21092]  register_netdevice+0xbc7/0x1480
[  548.988111][T21092]  ? netdev_update_lockdep_key+0x10/0x10
[  548.993719][T21092]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  548.998718][T21092]  ? __rcu_read_lock+0x50/0x50
[  549.003456][T21092]  ? alloc_netdev_mqs+0xa0c/0xc60
[  549.008453][T21092]  ? vti6_locate+0x551/0x910
[  549.013020][T21092]  vti6_locate+0x610/0x910
[  549.017413][T21092]  ? cap_capable+0x23f/0x280
[  549.021975][T21092]  ? vti6_link_config+0x530/0x530
[  549.026973][T21092]  ? vti6_ioctl+0xa64/0x1b10
[  549.031536][T21092]  vti6_ioctl+0xa88/0x1b10
[  549.035943][T21092]  ? vti6_tnl_xmit+0x1720/0x1720
[  549.040880][T21092]  ? __rcu_read_lock+0x50/0x50
[  549.045626][T21092]  ? check_preemption_disabled+0x154/0x330
[  549.051468][T21092]  ? avc_has_extended_perms+0xb5e/0x1140
[  549.057148][T21092]  ? full_name_hash+0xb4/0xe0
[  549.061826][T21092]  dev_ifsioc+0x675/0xa70
[  549.066136][T21092]  ? mutex_lock+0xa6/0x110
[  549.070528][T21092]  ? dev_ioctl+0xab0/0xab0
[  549.075020][T21092]  dev_ioctl+0x558/0xab0
[  549.079242][T21092]  sock_ioctl+0x677/0x760
[  549.083562][T21092]  ? sock_poll+0x2f0/0x2f0
[  549.087950][T21092]  ? memset+0x1f/0x40
[  549.091902][T21092]  ? fsnotify+0x1332/0x13f0
[  549.096380][T21092]  ? sock_poll+0x2f0/0x2f0
[  549.100782][T21092]  do_vfs_ioctl+0x76a/0x1720
[  549.105375][T21092]  ? selinux_file_ioctl+0x72f/0x990
[  549.110547][T21092]  ? ioctl_preallocate+0x250/0x250
[  549.115647][T21092]  ? __fget+0x37b/0x3c0
[  549.119776][T21092]  ? vfs_write+0x422/0x4e0
[  549.124165][T21092]  ? fget_many+0x20/0x20
[  549.128381][T21092]  ? debug_smp_processor_id+0x20/0x20
[  549.133793][T21092]  ? security_file_ioctl+0x9d/0xb0
[  549.138890][T21092]  __x64_sys_ioctl+0xd4/0x110
[  549.143656][T21092]  do_syscall_64+0xcb/0x1e0
[  549.148159][T21092]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  549.154030][T21092] RIP: 0033:0x466459
[  549.157928][T21092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
21:32:34 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000800900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:34 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x60000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:34 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xe00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:34 executing program 0 (fault-call:8 fault-nth:78):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:34 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1b}, @mcast2}})

21:32:34 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, 0x0, 0x0, 0x80061, 0x0)
fdatasync(r0)

[  549.177507][T21092] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  549.185891][T21092] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  549.193837][T21092] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  549.201802][T21092] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  549.209867][T21092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  549.217817][T21092] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:34 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x1100], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:34 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x65020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:34 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x68000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  549.250440][T21089] EXT4-fs (loop1): Can't read superblock on 2nd try
[  549.280435][T21106] x_tables: duplicate underflow at hook 2
[  549.286583][T21109] xt_SECMARK: invalid mode: 0
[  549.294364][T21113] xt_SECMARK: invalid mode: 0
21:32:34 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x1200], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  549.334684][T21117] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  549.343907][T21119] x_tables: duplicate underflow at hook 2
[  549.350695][T21126] FAULT_INJECTION: forcing a failure.
[  549.350695][T21126] name failslab, interval 1, probability 0, space 0, times 0
[  549.367239][T21126] CPU: 1 PID: 21126 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
21:32:34 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, 0x0, 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:34 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x2000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  549.377485][T21126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  549.387540][T21126] Call Trace:
[  549.390832][T21126]  dump_stack+0x1d8/0x24e
[  549.395148][T21126]  ? devkmsg_release+0x11c/0x11c
[  549.400082][T21126]  ? refcount_sub_and_test_checked+0x1b6/0x290
[  549.406235][T21126]  ? show_regs_print_info+0x12/0x12
[  549.411431][T21126]  ? refcount_inc_checked+0x50/0x50
[  549.416628][T21126]  ? refcount_inc_checked+0x1a/0x50
[  549.418550][T21131] x_tables: duplicate underflow at hook 2
[  549.421838][T21126]  should_fail+0x6f6/0x860
[  549.421848][T21126]  ? setup_fault_attr+0x3d0/0x3d0
[  549.421856][T21126]  ? device_add+0x5d8/0x18a0
[  549.421875][T21126]  ? kset_create_and_add+0x55/0x2a0
[  549.446744][T21126]  should_failslab+0x5/0x20
[  549.451371][T21126]  kmem_cache_alloc_trace+0x39/0x2b0
[  549.453884][T21134] x_tables: duplicate underflow at hook 2
[  549.456653][T21126]  ? virtual_device_parent+0x50/0x50
[  549.456666][T21126]  kset_create_and_add+0x55/0x2a0
[  549.456684][T21126]  netdev_register_kobject+0x1a2/0x310
[  549.478136][T21126]  ? raw_notifier_call_chain+0xf2/0x110
[  549.483667][T21126]  register_netdevice+0xbc7/0x1480
[  549.488771][T21126]  ? netdev_update_lockdep_key+0x10/0x10
[  549.494398][T21126]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  549.499413][T21126]  ? __rcu_read_lock+0x50/0x50
[  549.504159][T21126]  ? alloc_netdev_mqs+0xa0c/0xc60
[  549.509265][T21126]  ? vti6_locate+0x551/0x910
[  549.513841][T21126]  vti6_locate+0x610/0x910
[  549.518243][T21126]  ? cap_capable+0x23f/0x280
[  549.522808][T21126]  ? vti6_link_config+0x530/0x530
[  549.527817][T21126]  ? vti6_ioctl+0xa64/0x1b10
[  549.532392][T21126]  vti6_ioctl+0xa88/0x1b10
[  549.536817][T21126]  ? vti6_tnl_xmit+0x1720/0x1720
[  549.541741][T21126]  ? avc_has_extended_perms+0xb5e/0x1140
[  549.547355][T21126]  ? full_name_hash+0xb4/0xe0
[  549.552019][T21126]  dev_ifsioc+0x675/0xa70
[  549.556335][T21126]  ? mutex_lock+0xa6/0x110
[  549.560736][T21126]  ? dev_ioctl+0xab0/0xab0
[  549.565218][T21126]  dev_ioctl+0x558/0xab0
[  549.569439][T21126]  sock_ioctl+0x677/0x760
[  549.573749][T21126]  ? sock_poll+0x2f0/0x2f0
[  549.578166][T21126]  ? memset+0x1f/0x40
[  549.582128][T21126]  ? fsnotify+0x1332/0x13f0
[  549.586612][T21126]  ? sock_poll+0x2f0/0x2f0
[  549.591011][T21126]  do_vfs_ioctl+0x76a/0x1720
[  549.595581][T21126]  ? selinux_file_ioctl+0x72f/0x990
[  549.600758][T21126]  ? ioctl_preallocate+0x250/0x250
[  549.605864][T21126]  ? __fget+0x37b/0x3c0
[  549.610003][T21126]  ? vfs_write+0x422/0x4e0
[  549.614403][T21126]  ? fget_many+0x20/0x20
[  549.618644][T21126]  ? debug_smp_processor_id+0x20/0x20
[  549.623999][T21126]  ? security_file_ioctl+0x9d/0xb0
[  549.629089][T21126]  __x64_sys_ioctl+0xd4/0x110
[  549.633746][T21126]  do_syscall_64+0xcb/0x1e0
[  549.638246][T21126]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  549.644120][T21126] RIP: 0033:0x466459
[  549.647991][T21126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  549.667572][T21126] RSP: 002b:00007faa9aa7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  549.675965][T21126] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459
[  549.683924][T21126] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  549.691891][T21126] RBP: 00007faa9aa7f1d0 R08: 0000000000000000 R09: 0000000000000000
[  549.699841][T21126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  549.707810][T21126] R13: 00007ffe4ada44ff R14: 00007faa9aa7f300 R15: 0000000000022000
[  549.718626][T21125] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:35 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000900900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:35 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1c}, @mcast2}})

21:32:35 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x2500], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:35 executing program 0 (fault-call:8 fault-nth:79):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:35 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
fdatasync(r0)

21:32:35 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x6c000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  549.784403][T21125] EXT4-fs (loop1): Can't read superblock on 2nd try
[  549.792656][T21136] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
21:32:35 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  549.868552][T21155] x_tables: duplicate underflow at hook 2
[  549.871524][T21156] FAULT_INJECTION: forcing a failure.
[  549.871524][T21156] name failslab, interval 1, probability 0, space 0, times 0
[  549.887599][T21156] CPU: 0 PID: 21156 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  549.897842][T21156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  549.907894][T21156] Call Trace:
[  549.911199][T21156]  dump_stack+0x1d8/0x24e
[  549.918953][T21156]  ? devkmsg_release+0x11c/0x11c
[  549.923878][T21156]  ? refcount_sub_and_test_checked+0x1b6/0x290
[  549.930022][T21156]  ? show_regs_print_info+0x12/0x12
[  549.935205][T21156]  ? refcount_inc_checked+0x50/0x50
[  549.940521][T21156]  ? refcount_inc_checked+0x1a/0x50
[  549.946246][T21156]  should_fail+0x6f6/0x860
[  549.950643][T21156]  ? setup_fault_attr+0x3d0/0x3d0
[  549.955642][T21156]  ? device_add+0x5d8/0x18a0
[  549.960207][T21156]  ? kset_create_and_add+0x55/0x2a0
[  549.965377][T21156]  should_failslab+0x5/0x20
[  549.969856][T21156]  kmem_cache_alloc_trace+0x39/0x2b0
[  549.975113][T21156]  ? virtual_device_parent+0x50/0x50
[  549.980380][T21156]  kset_create_and_add+0x55/0x2a0
[  549.985378][T21156]  netdev_register_kobject+0x1a2/0x310
[  549.990830][T21156]  ? raw_notifier_call_chain+0xf2/0x110
[  549.996348][T21156]  register_netdevice+0xbc7/0x1480
[  550.001433][T21156]  ? netdev_update_lockdep_key+0x10/0x10
[  550.007038][T21156]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  550.012035][T21156]  ? __rcu_read_lock+0x50/0x50
[  550.016769][T21156]  ? alloc_netdev_mqs+0xa0c/0xc60
[  550.021766][T21156]  ? vti6_locate+0x551/0x910
[  550.026329][T21156]  vti6_locate+0x610/0x910
[  550.030722][T21156]  ? cap_capable+0x23f/0x280
[  550.035285][T21156]  ? vti6_link_config+0x530/0x530
[  550.040280][T21156]  ? vti6_ioctl+0xa64/0x1b10
[  550.044840][T21156]  vti6_ioctl+0xa88/0x1b10
[  550.049247][T21156]  ? vti6_tnl_xmit+0x1720/0x1720
[  550.054157][T21156]  ? __rcu_read_lock+0x50/0x50
[  550.058891][T21156]  ? check_preemption_disabled+0x154/0x330
[  550.064671][T21156]  ? avc_has_extended_perms+0xb5e/0x1140
[  550.070295][T21156]  ? full_name_hash+0xb4/0xe0
[  550.074961][T21156]  dev_ifsioc+0x675/0xa70
[  550.079269][T21156]  ? mutex_lock+0xa6/0x110
[  550.083658][T21156]  ? dev_ioctl+0xab0/0xab0
[  550.088049][T21156]  dev_ioctl+0x558/0xab0
[  550.092274][T21156]  sock_ioctl+0x677/0x760
[  550.096575][T21156]  ? sock_poll+0x2f0/0x2f0
[  550.100961][T21156]  ? memset+0x1f/0x40
[  550.104915][T21156]  ? fsnotify+0x1332/0x13f0
[  550.109391][T21156]  ? sock_poll+0x2f0/0x2f0
[  550.113780][T21156]  do_vfs_ioctl+0x76a/0x1720
[  550.118341][T21156]  ? selinux_file_ioctl+0x72f/0x990
[  550.123511][T21156]  ? ioctl_preallocate+0x250/0x250
[  550.128598][T21156]  ? __fget+0x37b/0x3c0
[  550.132729][T21156]  ? vfs_write+0x422/0x4e0
[  550.137121][T21156]  ? fget_many+0x20/0x20
[  550.141337][T21156]  ? debug_smp_processor_id+0x20/0x20
[  550.146684][T21156]  ? security_file_ioctl+0x9d/0xb0
[  550.151768][T21156]  __x64_sys_ioctl+0xd4/0x110
[  550.156458][T21156]  do_syscall_64+0xcb/0x1e0
[  550.160946][T21156]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
21:32:35 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x71000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  550.166875][T21156] RIP: 0033:0x466459
[  550.170748][T21156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  550.190331][T21156] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  550.198715][T21156] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  550.206669][T21156] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:35 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
fdatasync(r0)

21:32:35 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x74000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:35 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4800], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:35 executing program 0 (fault-call:8 fault-nth:80):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  550.214616][T21156] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  550.222565][T21156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  550.230512][T21156] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  550.241071][T21153] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  550.251203][T21151] EXT4-fs (loop1): Can't read superblock on 2nd try
[  550.263454][T21164] x_tables: duplicate underflow at hook 2
[  550.299978][T21151] EXT4-fs (loop1): Can't read superblock on 2nd try
[  550.321508][T21176] x_tables: duplicate underflow at hook 2
[  550.333812][T21175] FAULT_INJECTION: forcing a failure.
[  550.333812][T21175] name failslab, interval 1, probability 0, space 0, times 0
[  550.347849][T21175] CPU: 0 PID: 21175 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  550.358107][T21175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  550.368143][T21175] Call Trace:
[  550.371444][T21175]  dump_stack+0x1d8/0x24e
[  550.375758][T21175]  ? devkmsg_release+0x11c/0x11c
[  550.380695][T21175]  ? show_regs_print_info+0x12/0x12
[  550.385873][T21175]  should_fail+0x6f6/0x860
[  550.390272][T21175]  ? setup_fault_attr+0x3d0/0x3d0
[  550.395277][T21175]  ? kobject_set_name_vargs+0x5d/0x110
[  550.400712][T21175]  should_failslab+0x5/0x20
[  550.405292][T21175]  __kmalloc_track_caller+0x5d/0x2e0
[  550.410676][T21175]  kvasprintf+0xd6/0x180
[  550.414897][T21175]  ? asan.module_ctor+0x10/0x10
[  550.419769][T21175]  ? mutex_unlock+0x19/0x40
[  550.424262][T21175]  ? kernfs_add_one+0x49e/0x5c0
[  550.429089][T21175]  ? kvasprintf_const+0x4d/0x170
[  550.434008][T21175]  kobject_set_name_vargs+0x5d/0x110
[  550.439292][T21175]  kobject_init_and_add+0xdb/0x190
[  550.444388][T21175]  ? kobject_add+0x210/0x210
[  550.448952][T21175]  ? kobject_uevent_env+0x2bd/0x1040
[  550.454221][T21175]  ? kernfs_get+0x55/0x90
[  550.458534][T21175]  net_rx_queue_update_kobjects+0x174/0x460
[  550.464407][T21175]  netdev_register_kobject+0x222/0x310
[  550.469847][T21175]  register_netdevice+0xbc7/0x1480
[  550.474949][T21175]  ? netdev_update_lockdep_key+0x10/0x10
[  550.480559][T21175]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  550.485570][T21175]  ? __rcu_read_lock+0x50/0x50
[  550.490319][T21175]  ? alloc_netdev_mqs+0xa0c/0xc60
[  550.495324][T21175]  ? vti6_locate+0x551/0x910
[  550.499891][T21175]  vti6_locate+0x610/0x910
[  550.504286][T21175]  ? cap_capable+0x23f/0x280
[  550.508879][T21175]  ? vti6_link_config+0x530/0x530
[  550.513887][T21175]  ? vti6_ioctl+0xa64/0x1b10
[  550.518456][T21175]  vti6_ioctl+0xa88/0x1b10
[  550.522850][T21175]  ? vti6_tnl_xmit+0x1720/0x1720
[  550.527776][T21175]  ? __rcu_read_lock+0x50/0x50
[  550.532515][T21175]  ? check_preemption_disabled+0x154/0x330
[  550.538299][T21175]  ? avc_has_extended_perms+0xb5e/0x1140
[  550.543919][T21175]  ? full_name_hash+0xb4/0xe0
[  550.548588][T21175]  dev_ifsioc+0x675/0xa70
[  550.552903][T21175]  ? mutex_lock+0xa6/0x110
[  550.557294][T21175]  ? dev_ioctl+0xab0/0xab0
[  550.561689][T21175]  dev_ioctl+0x558/0xab0
[  550.565910][T21175]  sock_ioctl+0x677/0x760
[  550.570235][T21175]  ? sock_poll+0x2f0/0x2f0
[  550.574635][T21175]  ? memset+0x1f/0x40
[  550.578719][T21175]  ? fsnotify+0x1332/0x13f0
[  550.583205][T21175]  ? sock_poll+0x2f0/0x2f0
[  550.587602][T21175]  do_vfs_ioctl+0x76a/0x1720
[  550.592172][T21175]  ? selinux_file_ioctl+0x72f/0x990
[  550.597345][T21175]  ? ioctl_preallocate+0x250/0x250
[  550.602436][T21175]  ? __fget+0x37b/0x3c0
[  550.606571][T21175]  ? vfs_write+0x422/0x4e0
[  550.610971][T21175]  ? fget_many+0x20/0x20
[  550.615196][T21175]  ? debug_smp_processor_id+0x20/0x20
[  550.620571][T21175]  ? security_file_ioctl+0x9d/0xb0
[  550.625661][T21175]  __x64_sys_ioctl+0xd4/0x110
[  550.630315][T21175]  do_syscall_64+0xcb/0x1e0
[  550.634803][T21175]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  550.640689][T21175] RIP: 0033:0x466459
[  550.645512][T21175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  550.665092][T21175] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  550.673484][T21175] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  550.681456][T21175] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  550.689499][T21175] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
21:32:35 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000a00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:35 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1d}, @mcast2}})

21:32:35 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x74fd0100], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:35 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4c00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:35 executing program 0 (fault-call:8 fault-nth:81):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:36 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000b00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  550.697449][T21175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  550.705421][T21175] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  550.715667][T21175] kobject: can not set name properly!
21:32:36 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:36 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x7a000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  550.755459][T21184] EXT4-fs (loop1): Can't read superblock on 2nd try
[  550.763381][T21172] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  550.796230][T21190] FAULT_INJECTION: forcing a failure.
[  550.796230][T21190] name failslab, interval 1, probability 0, space 0, times 0
[  550.809760][T21190] CPU: 1 PID: 21190 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  550.819992][T21190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  550.830032][T21190] Call Trace:
[  550.833343][T21190]  dump_stack+0x1d8/0x24e
[  550.837667][T21190]  ? devkmsg_release+0x11c/0x11c
[  550.842593][T21190]  ? show_regs_print_info+0x12/0x12
[  550.847772][T21190]  ? __kasan_kmalloc+0x1a3/0x1e0
[  550.852693][T21190]  should_fail+0x6f6/0x860
[  550.857113][T21190]  ? setup_fault_attr+0x3d0/0x3d0
[  550.862125][T21190]  ? __kasan_kmalloc+0x137/0x1e0
[  550.867056][T21190]  ? __kmalloc_track_caller+0x13a/0x2e0
[  550.872595][T21190]  ? kobject_set_name_vargs+0x5d/0x110
[  550.878059][T21190]  ? __kernfs_new_node+0x99/0x6d0
[  550.883086][T21190]  should_failslab+0x5/0x20
[  550.887602][T21190]  __kmalloc_track_caller+0x5d/0x2e0
[  550.892878][T21190]  ? __x64_sys_ioctl+0xd4/0x110
[  550.897728][T21190]  ? do_syscall_64+0xcb/0x1e0
[  550.902434][T21190]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  550.908502][T21190]  kstrdup_const+0x51/0x90
[  550.912953][T21190]  __kernfs_new_node+0x99/0x6d0
[  550.917797][T21190]  ? kernfs_new_node+0x160/0x160
[  550.922724][T21190]  ? vsnprintf+0x1e4/0x1d60
[  550.927206][T21190]  ? make_kgid+0x24f/0x390
[  550.931616][T21190]  ? from_kuid_munged+0x3b0/0x3b0
[  550.936617][T21190]  kernfs_create_dir_ns+0x90/0x220
[  550.941704][T21190]  sysfs_create_dir_ns+0x181/0x390
[  550.946789][T21190]  ? sysfs_warn_dup+0xa0/0xa0
[  550.951477][T21190]  ? mutex_unlock+0x19/0x40
[  550.955957][T21190]  kobject_add_internal+0x595/0xbd0
[  550.961131][T21190]  kobject_init_and_add+0x123/0x190
[  550.966305][T21190]  ? kobject_add+0x210/0x210
[  550.970869][T21190]  ? kobject_uevent_env+0x2bd/0x1040
[  550.976144][T21190]  ? kernfs_get+0x55/0x90
[  550.980448][T21190]  net_rx_queue_update_kobjects+0x174/0x460
[  550.986314][T21190]  netdev_register_kobject+0x222/0x310
[  550.991752][T21190]  register_netdevice+0xbc7/0x1480
[  550.996839][T21190]  ? netdev_update_lockdep_key+0x10/0x10
[  551.002445][T21190]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  551.007445][T21190]  ? __rcu_read_lock+0x50/0x50
[  551.012182][T21190]  ? alloc_netdev_mqs+0xa0c/0xc60
[  551.017179][T21190]  ? vti6_locate+0x551/0x910
[  551.021738][T21190]  vti6_locate+0x610/0x910
[  551.026127][T21190]  ? cap_capable+0x23f/0x280
[  551.030691][T21190]  ? vti6_link_config+0x530/0x530
[  551.035689][T21190]  ? vti6_ioctl+0xa64/0x1b10
[  551.040251][T21190]  vti6_ioctl+0xa88/0x1b10
[  551.044640][T21190]  ? vti6_tnl_xmit+0x1720/0x1720
[  551.049552][T21190]  ? __rcu_read_lock+0x50/0x50
[  551.054291][T21190]  ? check_preemption_disabled+0x154/0x330
[  551.060070][T21190]  ? avc_has_extended_perms+0xb5e/0x1140
[  551.065676][T21190]  ? full_name_hash+0xb4/0xe0
[  551.070330][T21190]  dev_ifsioc+0x675/0xa70
[  551.074670][T21190]  ? mutex_lock+0xa6/0x110
[  551.079086][T21190]  ? dev_ioctl+0xab0/0xab0
[  551.083484][T21190]  dev_ioctl+0x558/0xab0
[  551.087708][T21190]  sock_ioctl+0x677/0x760
[  551.092009][T21190]  ? sock_poll+0x2f0/0x2f0
[  551.096398][T21190]  ? memset+0x1f/0x40
[  551.100354][T21190]  ? fsnotify+0x1332/0x13f0
[  551.104826][T21190]  ? sock_poll+0x2f0/0x2f0
[  551.109217][T21190]  do_vfs_ioctl+0x76a/0x1720
[  551.113784][T21190]  ? selinux_file_ioctl+0x72f/0x990
[  551.118955][T21190]  ? ioctl_preallocate+0x250/0x250
[  551.124039][T21190]  ? __fget+0x37b/0x3c0
[  551.128168][T21190]  ? vfs_write+0x422/0x4e0
[  551.132558][T21190]  ? fget_many+0x20/0x20
[  551.136776][T21190]  ? debug_smp_processor_id+0x20/0x20
[  551.142119][T21190]  ? security_file_ioctl+0x9d/0xb0
[  551.147225][T21190]  __x64_sys_ioctl+0xd4/0x110
[  551.151874][T21190]  do_syscall_64+0xcb/0x1e0
[  551.156352][T21190]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  551.162233][T21190] RIP: 0033:0x466459
[  551.166117][T21190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  551.185696][T21190] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
21:32:36 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
fdatasync(r0)

21:32:36 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6800], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  551.194081][T21190] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  551.202025][T21190] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  551.209988][T21190] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  551.217934][T21190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  551.225878][T21190] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:36 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1e}, @mcast2}})

21:32:36 executing program 0 (fault-call:8 fault-nth:82):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:36 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x7f010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:36 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000c00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  551.251240][T21194] EXT4-fs (loop1): Can't read superblock on 2nd try
[  551.260683][T21190] kobject_add_internal failed for rx-0 (error: -12 parent: queues)
21:32:36 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6c00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  551.292467][T21201] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  551.311127][T21208] FAULT_INJECTION: forcing a failure.
[  551.311127][T21208] name failslab, interval 1, probability 0, space 0, times 0
[  551.325781][T21208] CPU: 0 PID: 21208 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  551.336040][T21208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  551.346092][T21208] Call Trace:
[  551.349386][T21208]  dump_stack+0x1d8/0x24e
[  551.353804][T21208]  ? devkmsg_release+0x11c/0x11c
[  551.358721][T21208]  ? show_regs_print_info+0x12/0x12
[  551.363907][T21208]  should_fail+0x6f6/0x860
[  551.368322][T21208]  ? setup_fault_attr+0x3d0/0x3d0
[  551.373344][T21208]  ? __kernfs_new_node+0xdb/0x6d0
[  551.378365][T21208]  should_failslab+0x5/0x20
[  551.382869][T21208]  kmem_cache_alloc+0x36/0x290
[  551.387630][T21208]  ? memcpy+0x38/0x50
[  551.391607][T21208]  __kernfs_new_node+0xdb/0x6d0
[  551.396451][T21208]  ? kernfs_new_node+0x160/0x160
[  551.401379][T21208]  ? vsnprintf+0x1e4/0x1d60
[  551.405865][T21208]  ? make_kgid+0x24f/0x390
[  551.410262][T21208]  ? from_kuid_munged+0x3b0/0x3b0
[  551.415269][T21208]  kernfs_create_dir_ns+0x90/0x220
[  551.420354][T21208]  sysfs_create_dir_ns+0x181/0x390
[  551.425436][T21208]  ? sysfs_warn_dup+0xa0/0xa0
[  551.430086][T21208]  ? mutex_unlock+0x19/0x40
[  551.434561][T21208]  kobject_add_internal+0x595/0xbd0
[  551.439731][T21208]  kobject_init_and_add+0x123/0x190
[  551.444902][T21208]  ? kobject_add+0x210/0x210
[  551.449986][T21208]  ? kobject_uevent_env+0x2bd/0x1040
[  551.455675][T21208]  ? kernfs_get+0x55/0x90
[  551.459982][T21208]  net_rx_queue_update_kobjects+0x174/0x460
[  551.465848][T21208]  netdev_register_kobject+0x222/0x310
[  551.471278][T21208]  register_netdevice+0xbc7/0x1480
[  551.476362][T21208]  ? netdev_update_lockdep_key+0x10/0x10
[  551.481969][T21208]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  551.486965][T21208]  ? __rcu_read_lock+0x50/0x50
[  551.491719][T21208]  ? alloc_netdev_mqs+0xa0c/0xc60
[  551.496716][T21208]  ? vti6_locate+0x551/0x910
[  551.501277][T21208]  vti6_locate+0x610/0x910
[  551.505667][T21208]  ? cap_capable+0x23f/0x280
[  551.510232][T21208]  ? vti6_link_config+0x530/0x530
[  551.515225][T21208]  ? vti6_ioctl+0xa64/0x1b10
[  551.519786][T21208]  vti6_ioctl+0xa88/0x1b10
[  551.524205][T21208]  ? vti6_tnl_xmit+0x1720/0x1720
[  551.529222][T21208]  ? __rcu_read_lock+0x50/0x50
[  551.533964][T21208]  ? check_preemption_disabled+0x154/0x330
[  551.539744][T21208]  ? avc_has_extended_perms+0xb5e/0x1140
[  551.545521][T21208]  ? full_name_hash+0xb4/0xe0
[  551.550177][T21208]  dev_ifsioc+0x675/0xa70
[  551.554479][T21208]  ? mutex_lock+0xa6/0x110
[  551.558866][T21208]  ? dev_ioctl+0xab0/0xab0
[  551.563257][T21208]  dev_ioctl+0x558/0xab0
[  551.567469][T21208]  sock_ioctl+0x677/0x760
[  551.571770][T21208]  ? sock_poll+0x2f0/0x2f0
[  551.576162][T21208]  ? memset+0x1f/0x40
[  551.580116][T21208]  ? fsnotify+0x1332/0x13f0
[  551.584590][T21208]  ? sock_poll+0x2f0/0x2f0
[  551.588980][T21208]  do_vfs_ioctl+0x76a/0x1720
[  551.593540][T21208]  ? selinux_file_ioctl+0x72f/0x990
[  551.598712][T21208]  ? ioctl_preallocate+0x250/0x250
[  551.603796][T21208]  ? __fget+0x37b/0x3c0
[  551.607923][T21208]  ? vfs_write+0x422/0x4e0
[  551.612423][T21208]  ? fget_many+0x20/0x20
[  551.616639][T21208]  ? debug_smp_processor_id+0x20/0x20
[  551.621985][T21208]  ? security_file_ioctl+0x9d/0xb0
[  551.627764][T21208]  __x64_sys_ioctl+0xd4/0x110
[  551.632415][T21208]  do_syscall_64+0xcb/0x1e0
[  551.636892][T21208]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
21:32:36 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x8c020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  551.642929][T21208] RIP: 0033:0x466459
[  551.646795][T21208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  551.666385][T21208] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  551.674767][T21208] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  551.682711][T21208] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:36 executing program 2:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(0xffffffffffffffff)

21:32:37 executing program 0 (fault-call:8 fault-nth:83):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7400], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  551.690656][T21208] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  551.698607][T21208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  551.706549][T21208] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  551.715923][T21208] kobject_add_internal failed for rx-0 (error: -12 parent: queues)
21:32:37 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x8e020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  551.742844][T21213] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7a00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xa004], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  551.766999][T21224] FAULT_INJECTION: forcing a failure.
[  551.766999][T21224] name failslab, interval 1, probability 0, space 0, times 0
[  551.781074][T21224] CPU: 1 PID: 21224 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  551.791369][T21224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  551.801415][T21224] Call Trace:
[  551.804707][T21224]  dump_stack+0x1d8/0x24e
[  551.809036][T21224]  ? devkmsg_release+0x11c/0x11c
[  551.813973][T21224]  ? show_regs_print_info+0x12/0x12
[  551.819174][T21224]  ? __kasan_kmalloc+0x1a3/0x1e0
[  551.824211][T21224]  ? kmem_cache_alloc+0x115/0x290
[  551.829236][T21224]  ? __kernfs_new_node+0xdb/0x6d0
[  551.834261][T21224]  ? kernfs_create_dir_ns+0x90/0x220
[  551.839545][T21224]  ? sysfs_create_dir_ns+0x181/0x390
[  551.844832][T21224]  should_fail+0x6f6/0x860
[  551.849254][T21224]  ? setup_fault_attr+0x3d0/0x3d0
[  551.854280][T21224]  ? mutex_unlock+0x19/0x40
[  551.858778][T21224]  ? __kernfs_new_node+0xdb/0x6d0
[  551.863783][T21224]  should_failslab+0x5/0x20
[  551.868270][T21224]  kmem_cache_alloc+0x36/0x290
[  551.873030][T21224]  __kernfs_new_node+0xdb/0x6d0
[  551.877861][T21224]  ? kernfs_new_node+0x160/0x160
[  551.882778][T21224]  ? _raw_spin_lock+0xa3/0x1b0
[  551.887606][T21224]  ? security_kernfs_init_security+0x9a/0xb0
[  551.893584][T21224]  kernfs_new_node+0x95/0x160
[  551.898247][T21224]  __kernfs_create_file+0x45/0x260
[  551.903348][T21224]  sysfs_add_file_mode_ns+0x293/0x340
[  551.908713][T21224]  internal_create_group+0x560/0xf10
[  551.913988][T21224]  ? sysfs_create_dir_ns+0x181/0x390
[  551.919262][T21224]  ? sysfs_create_dir_ns+0x1c7/0x390
[  551.924535][T21224]  ? sysfs_create_group+0x20/0x20
[  551.929543][T21224]  sysfs_create_groups+0x5d/0x130
[  551.934568][T21224]  kobject_add_internal+0x708/0xbd0
[  551.939769][T21224]  kobject_init_and_add+0x123/0x190
[  551.944955][T21224]  ? kobject_add+0x210/0x210
[  551.949531][T21224]  ? kobject_uevent_env+0x2bd/0x1040
[  551.954818][T21224]  ? kernfs_get+0x55/0x90
[  551.959153][T21224]  net_rx_queue_update_kobjects+0x174/0x460
[  551.965032][T21224]  netdev_register_kobject+0x222/0x310
[  551.970485][T21224]  register_netdevice+0xbc7/0x1480
[  551.975586][T21224]  ? netdev_update_lockdep_key+0x10/0x10
[  551.981200][T21224]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  551.986211][T21224]  ? __rcu_read_lock+0x50/0x50
[  551.990964][T21224]  ? alloc_netdev_mqs+0xa0c/0xc60
[  551.995971][T21224]  ? vti6_locate+0x551/0x910
[  552.000537][T21224]  vti6_locate+0x610/0x910
[  552.004949][T21224]  ? cap_capable+0x23f/0x280
[  552.009547][T21224]  ? vti6_link_config+0x530/0x530
[  552.014560][T21224]  ? vti6_ioctl+0xa64/0x1b10
[  552.019131][T21224]  vti6_ioctl+0xa88/0x1b10
[  552.023528][T21224]  ? vti6_tnl_xmit+0x1720/0x1720
[  552.028443][T21224]  ? __rcu_read_lock+0x50/0x50
[  552.033183][T21224]  ? check_preemption_disabled+0x154/0x330
[  552.038969][T21224]  ? avc_has_extended_perms+0xb5e/0x1140
[  552.044586][T21224]  ? full_name_hash+0xb4/0xe0
[  552.049248][T21224]  dev_ifsioc+0x675/0xa70
[  552.053702][T21224]  ? mutex_lock+0xa6/0x110
[  552.058105][T21224]  ? dev_ioctl+0xab0/0xab0
[  552.062507][T21224]  dev_ioctl+0x558/0xab0
[  552.066755][T21224]  sock_ioctl+0x677/0x760
[  552.071065][T21224]  ? sock_poll+0x2f0/0x2f0
[  552.075459][T21224]  ? memset+0x1f/0x40
[  552.079428][T21224]  ? fsnotify+0x1332/0x13f0
[  552.083911][T21224]  ? sock_poll+0x2f0/0x2f0
[  552.088320][T21224]  do_vfs_ioctl+0x76a/0x1720
[  552.092896][T21224]  ? selinux_file_ioctl+0x72f/0x990
[  552.098070][T21224]  ? ioctl_preallocate+0x250/0x250
[  552.103167][T21224]  ? __fget+0x37b/0x3c0
[  552.107316][T21224]  ? vfs_write+0x422/0x4e0
[  552.111723][T21224]  ? fget_many+0x20/0x20
[  552.115945][T21224]  ? debug_smp_processor_id+0x20/0x20
[  552.121312][T21224]  ? security_file_ioctl+0x9d/0xb0
[  552.126400][T21224]  __x64_sys_ioctl+0xd4/0x110
[  552.131155][T21224]  do_syscall_64+0xcb/0x1e0
[  552.135650][T21224]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  552.141532][T21224] RIP: 0033:0x466459
[  552.145407][T21224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  552.164991][T21224] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  552.173377][T21224] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  552.181335][T21224] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  552.189290][T21224] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  552.197242][T21224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  552.205295][T21224] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:37 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b1f}, @mcast2}})

21:32:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xc005], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:37 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x9a020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:37 executing program 0 (fault-call:8 fault-nth:84):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:37 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000d00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  552.224968][T21236] secmark_tg_check: 16 callbacks suppressed
[  552.224973][T21236] xt_SECMARK: invalid mode: 0
[  552.239288][T21224] kobject_add_internal failed for rx-0 (error: -12 parent: queues)
[  552.244103][T21239] xt_SECMARK: invalid mode: 0
21:32:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xf801], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  552.273458][T21234] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  552.312471][T21234] EXT4-fs (loop2): re-mounted. Opts: (null)
[  552.320044][T21249] EXT4-fs (loop1): Can't read superblock on 2nd try
[  552.321626][T21244] FAULT_INJECTION: forcing a failure.
[  552.321626][T21244] name failslab, interval 1, probability 0, space 0, times 0
[  552.333106][T21246] xt_SECMARK: invalid mode: 0
[  552.343673][T21244] CPU: 0 PID: 21244 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  552.354254][T21244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  552.362262][T21255] xt_SECMARK: invalid mode: 0
[  552.364297][T21244] Call Trace:
[  552.364317][T21244]  dump_stack+0x1d8/0x24e
[  552.364336][T21244]  ? devkmsg_release+0x11c/0x11c
[  552.381489][T21244]  ? show_regs_print_info+0x12/0x12
[  552.386671][T21244]  should_fail+0x6f6/0x860
[  552.391070][T21244]  ? setup_fault_attr+0x3d0/0x3d0
[  552.396072][T21244]  ? __kernfs_new_node+0xdb/0x6d0
[  552.401076][T21244]  should_failslab+0x5/0x20
[  552.405555][T21244]  kmem_cache_alloc+0x36/0x290
[  552.410293][T21244]  ? memcpy+0x38/0x50
[  552.414250][T21244]  __kernfs_new_node+0xdb/0x6d0
[  552.419161][T21244]  ? kernfs_new_node+0x160/0x160
[  552.424077][T21244]  ? vsnprintf+0x1e4/0x1d60
[  552.428554][T21244]  ? make_kgid+0x24f/0x390
[  552.433046][T21244]  ? from_kuid_munged+0x3b0/0x3b0
[  552.438057][T21244]  kernfs_create_dir_ns+0x90/0x220
[  552.443140][T21244]  sysfs_create_dir_ns+0x181/0x390
[  552.448228][T21244]  ? sysfs_warn_dup+0xa0/0xa0
[  552.452880][T21244]  ? mutex_unlock+0x19/0x40
[  552.457358][T21244]  kobject_add_internal+0x595/0xbd0
[  552.462528][T21244]  kobject_init_and_add+0x123/0x190
[  552.467698][T21244]  ? kobject_add+0x210/0x210
[  552.472260][T21244]  ? kobject_uevent_env+0x2bd/0x1040
[  552.477517][T21244]  ? kernfs_get+0x55/0x90
[  552.481843][T21244]  net_rx_queue_update_kobjects+0x174/0x460
[  552.487707][T21244]  netdev_register_kobject+0x222/0x310
[  552.493141][T21244]  register_netdevice+0xbc7/0x1480
[  552.498242][T21244]  ? netdev_update_lockdep_key+0x10/0x10
[  552.503863][T21244]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  552.508861][T21244]  ? __rcu_read_lock+0x50/0x50
[  552.513595][T21244]  ? alloc_netdev_mqs+0xa0c/0xc60
[  552.518590][T21244]  ? vti6_locate+0x551/0x910
[  552.523149][T21244]  vti6_locate+0x610/0x910
[  552.527538][T21244]  ? cap_capable+0x23f/0x280
[  552.532098][T21244]  ? vti6_link_config+0x530/0x530
[  552.537092][T21244]  ? vti6_ioctl+0xa64/0x1b10
[  552.541650][T21244]  vti6_ioctl+0xa88/0x1b10
[  552.546036][T21244]  ? vti6_tnl_xmit+0x1720/0x1720
[  552.550945][T21244]  ? __rcu_read_lock+0x50/0x50
[  552.555681][T21244]  ? check_preemption_disabled+0x154/0x330
[  552.561459][T21244]  ? avc_has_extended_perms+0xb5e/0x1140
[  552.567063][T21244]  ? full_name_hash+0xb4/0xe0
[  552.571717][T21244]  dev_ifsioc+0x675/0xa70
[  552.576020][T21244]  ? mutex_lock+0xa6/0x110
[  552.580408][T21244]  ? dev_ioctl+0xab0/0xab0
[  552.584796][T21244]  dev_ioctl+0x558/0xab0
[  552.589011][T21244]  sock_ioctl+0x677/0x760
[  552.593313][T21244]  ? sock_poll+0x2f0/0x2f0
[  552.597723][T21244]  ? memset+0x1f/0x40
[  552.601676][T21244]  ? fsnotify+0x1332/0x13f0
[  552.606149][T21244]  ? sock_poll+0x2f0/0x2f0
[  552.610538][T21244]  do_vfs_ioctl+0x76a/0x1720
[  552.615103][T21244]  ? selinux_file_ioctl+0x72f/0x990
[  552.620275][T21244]  ? ioctl_preallocate+0x250/0x250
[  552.625359][T21244]  ? __fget+0x37b/0x3c0
[  552.629503][T21244]  ? vfs_write+0x422/0x4e0
[  552.633898][T21244]  ? fget_many+0x20/0x20
[  552.638115][T21244]  ? debug_smp_processor_id+0x20/0x20
[  552.643460][T21244]  ? security_file_ioctl+0x9d/0xb0
[  552.648561][T21244]  __x64_sys_ioctl+0xd4/0x110
[  552.653212][T21244]  do_syscall_64+0xcb/0x1e0
[  552.657689][T21244]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  552.663558][T21244] RIP: 0033:0x466459
21:32:37 executing program 2:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(0xffffffffffffffff)

21:32:37 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xba000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:38 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x1000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  552.667444][T21244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  552.687022][T21244] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  552.695403][T21244] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  552.703348][T21244] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  552.711292][T21244] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  552.719235][T21244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:32:38 executing program 0 (fault-call:8 fault-nth:85):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:38 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b20}, @mcast2}})

[  552.727177][T21244] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  552.739859][T21244] kobject_add_internal failed for rx-0 (error: -12 parent: queues)
21:32:38 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x2000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:38 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xbf010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  552.778889][T21259] xt_SECMARK: invalid mode: 0
[  552.786105][T21261] xt_SECMARK: invalid mode: 0
[  552.800830][T21257] FAULT_INJECTION: forcing a failure.
[  552.800830][T21257] name failslab, interval 1, probability 0, space 0, times 0
[  552.821214][T21257] CPU: 0 PID: 21257 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  552.831568][T21257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  552.841603][T21257] Call Trace:
[  552.844882][T21257]  dump_stack+0x1d8/0x24e
[  552.849236][T21257]  ? devkmsg_release+0x11c/0x11c
[  552.854196][T21257]  ? show_regs_print_info+0x12/0x12
[  552.859396][T21257]  ? __kasan_kmalloc+0x1a3/0x1e0
[  552.864337][T21257]  ? kmem_cache_alloc+0x115/0x290
[  552.869352][T21257]  ? __kernfs_new_node+0xdb/0x6d0
[  552.874477][T21257]  ? kernfs_create_dir_ns+0x90/0x220
[  552.879758][T21257]  ? sysfs_create_dir_ns+0x181/0x390
[  552.885100][T21257]  should_fail+0x6f6/0x860
[  552.889509][T21257]  ? setup_fault_attr+0x3d0/0x3d0
[  552.894519][T21257]  ? mutex_unlock+0x19/0x40
[  552.899024][T21257]  ? __kernfs_new_node+0xdb/0x6d0
[  552.904036][T21257]  should_failslab+0x5/0x20
[  552.908535][T21257]  kmem_cache_alloc+0x36/0x290
[  552.913294][T21257]  __kernfs_new_node+0xdb/0x6d0
[  552.918141][T21257]  ? kernfs_new_node+0x160/0x160
[  552.923067][T21257]  ? _raw_spin_lock+0xa3/0x1b0
[  552.927814][T21257]  ? security_kernfs_init_security+0x9a/0xb0
[  552.933777][T21257]  kernfs_new_node+0x95/0x160
[  552.938436][T21257]  __kernfs_create_file+0x45/0x260
[  552.943701][T21257]  sysfs_add_file_mode_ns+0x293/0x340
[  552.949051][T21257]  internal_create_group+0x560/0xf10
[  552.954316][T21257]  ? sysfs_create_dir_ns+0x181/0x390
[  552.959581][T21257]  ? sysfs_create_dir_ns+0x1c7/0x390
[  552.964842][T21257]  ? sysfs_create_group+0x20/0x20
[  552.969848][T21257]  sysfs_create_groups+0x5d/0x130
[  552.974865][T21257]  kobject_add_internal+0x708/0xbd0
[  552.980147][T21257]  kobject_init_and_add+0x123/0x190
[  552.985348][T21257]  ? kobject_add+0x210/0x210
[  552.989925][T21257]  ? kobject_uevent_env+0x2bd/0x1040
[  552.995190][T21257]  ? kernfs_get+0x55/0x90
[  552.999502][T21257]  net_rx_queue_update_kobjects+0x174/0x460
[  553.005384][T21257]  netdev_register_kobject+0x222/0x310
[  553.010825][T21257]  register_netdevice+0xbc7/0x1480
[  553.015917][T21257]  ? netdev_update_lockdep_key+0x10/0x10
[  553.021528][T21257]  ? xdp_rxq_info_reg+0x18e/0x2f0
21:32:38 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x3000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  553.026537][T21257]  ? __rcu_read_lock+0x50/0x50
[  553.031287][T21257]  ? alloc_netdev_mqs+0xa0c/0xc60
[  553.036291][T21257]  ? vti6_locate+0x551/0x910
[  553.040859][T21257]  vti6_locate+0x610/0x910
[  553.045288][T21257]  ? cap_capable+0x23f/0x280
[  553.049862][T21257]  ? vti6_link_config+0x530/0x530
[  553.055010][T21257]  ? vti6_ioctl+0xa64/0x1b10
[  553.059582][T21257]  vti6_ioctl+0xa88/0x1b10
[  553.064113][T21257]  ? vti6_tnl_xmit+0x1720/0x1720
[  553.069043][T21257]  ? __rcu_read_lock+0x50/0x50
[  553.073932][T21257]  ? check_preemption_disabled+0x154/0x330
[  553.079753][T21257]  ? avc_has_extended_perms+0xb5e/0x1140
[  553.085481][T21257]  ? full_name_hash+0xb4/0xe0
[  553.090146][T21257]  dev_ifsioc+0x675/0xa70
[  553.094534][T21257]  ? mutex_lock+0xa6/0x110
[  553.098939][T21257]  ? dev_ioctl+0xab0/0xab0
[  553.103336][T21257]  dev_ioctl+0x558/0xab0
[  553.107622][T21257]  sock_ioctl+0x677/0x760
[  553.112028][T21257]  ? sock_poll+0x2f0/0x2f0
[  553.116434][T21257]  ? memset+0x1f/0x40
[  553.120436][T21257]  ? fsnotify+0x1332/0x13f0
[  553.124916][T21257]  ? sock_poll+0x2f0/0x2f0
[  553.129354][T21257]  do_vfs_ioctl+0x76a/0x1720
[  553.133924][T21257]  ? selinux_file_ioctl+0x72f/0x990
[  553.139102][T21257]  ? ioctl_preallocate+0x250/0x250
[  553.144227][T21257]  ? __fget+0x37b/0x3c0
[  553.148371][T21257]  ? vfs_write+0x422/0x4e0
[  553.152773][T21257]  ? fget_many+0x20/0x20
[  553.157011][T21257]  ? debug_smp_processor_id+0x20/0x20
[  553.162375][T21257]  ? security_file_ioctl+0x9d/0xb0
[  553.167504][T21257]  __x64_sys_ioctl+0xd4/0x110
[  553.172166][T21257]  do_syscall_64+0xcb/0x1e0
[  553.176666][T21257]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  553.182552][T21257] RIP: 0033:0x466459
[  553.186430][T21257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  553.206013][T21257] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  553.214413][T21257] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  553.222373][T21257] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:38 executing program 0 (fault-call:8 fault-nth:86):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  553.230325][T21257] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  553.238277][T21257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  553.246344][T21257] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  553.254988][T21257] kobject_add_internal failed for rx-0 (error: -12 parent: queues)
[  553.279617][T21249] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:38 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xc0050000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  553.301208][T21267] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  553.303866][T21278] xt_check_table_hooks: 11 callbacks suppressed
[  553.303871][T21278] x_tables: duplicate underflow at hook 2
[  553.314423][T21273] FAULT_INJECTION: forcing a failure.
[  553.314423][T21273] name failslab, interval 1, probability 0, space 0, times 0
[  553.317177][T21279] xt_SECMARK: invalid mode: 0
[  553.322663][T21273] CPU: 1 PID: 21273 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  553.349360][T21280] xt_SECMARK: invalid mode: 0
[  553.349815][T21273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  553.364512][T21273] Call Trace:
[  553.367818][T21273]  dump_stack+0x1d8/0x24e
[  553.372132][T21273]  ? devkmsg_release+0x11c/0x11c
[  553.377055][T21273]  ? show_regs_print_info+0x12/0x12
[  553.382236][T21273]  should_fail+0x6f6/0x860
[  553.386633][T21273]  ? setup_fault_attr+0x3d0/0x3d0
[  553.391662][T21273]  ? kzalloc+0x1d/0x30
[  553.395776][T21273]  should_failslab+0x5/0x20
[  553.400258][T21273]  __kmalloc+0x5f/0x2f0
[  553.404403][T21273]  kzalloc+0x1d/0x30
[  553.408274][T21273]  kobject_get_path+0xb3/0x190
[  553.413015][T21273]  kobject_uevent_env+0x269/0x1040
[  553.418103][T21273]  ? kobject_uevent_env+0x2bd/0x1040
[  553.423367][T21273]  ? kernfs_get+0x55/0x90
[  553.427679][T21273]  net_rx_queue_update_kobjects+0x1ef/0x460
[  553.433552][T21273]  netdev_register_kobject+0x222/0x310
[  553.439000][T21273]  register_netdevice+0xbc7/0x1480
[  553.444089][T21273]  ? netdev_update_lockdep_key+0x10/0x10
[  553.449698][T21273]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  553.454702][T21273]  ? __rcu_read_lock+0x50/0x50
[  553.459466][T21273]  ? alloc_netdev_mqs+0xa0c/0xc60
[  553.464468][T21273]  ? vti6_locate+0x551/0x910
[  553.469040][T21273]  vti6_locate+0x610/0x910
[  553.473467][T21273]  ? cap_capable+0x23f/0x280
[  553.478033][T21273]  ? vti6_link_config+0x530/0x530
[  553.483037][T21273]  ? vti6_ioctl+0xa64/0x1b10
[  553.487625][T21273]  vti6_ioctl+0xa88/0x1b10
[  553.492018][T21273]  ? vti6_tnl_xmit+0x1720/0x1720
[  553.496940][T21273]  ? __rcu_read_lock+0x50/0x50
[  553.501721][T21273]  ? check_preemption_disabled+0x154/0x330
[  553.507619][T21273]  ? avc_has_extended_perms+0xb5e/0x1140
[  553.513237][T21273]  ? full_name_hash+0xb4/0xe0
[  553.517898][T21273]  dev_ifsioc+0x675/0xa70
[  553.522211][T21273]  ? mutex_lock+0xa6/0x110
[  553.526606][T21273]  ? dev_ioctl+0xab0/0xab0
[  553.531011][T21273]  dev_ioctl+0x558/0xab0
[  553.535232][T21273]  sock_ioctl+0x677/0x760
[  553.539549][T21273]  ? sock_poll+0x2f0/0x2f0
[  553.543944][T21273]  ? memset+0x1f/0x40
[  553.547901][T21273]  ? fsnotify+0x1332/0x13f0
[  553.552381][T21273]  ? sock_poll+0x2f0/0x2f0
[  553.556775][T21273]  do_vfs_ioctl+0x76a/0x1720
[  553.561354][T21273]  ? selinux_file_ioctl+0x72f/0x990
[  553.566539][T21273]  ? ioctl_preallocate+0x250/0x250
[  553.571831][T21273]  ? __fget+0x37b/0x3c0
[  553.575977][T21273]  ? vfs_write+0x422/0x4e0
[  553.580379][T21273]  ? fget_many+0x20/0x20
[  553.584627][T21273]  ? debug_smp_processor_id+0x20/0x20
[  553.589991][T21273]  ? security_file_ioctl+0x9d/0xb0
[  553.595086][T21273]  __x64_sys_ioctl+0xd4/0x110
[  553.599750][T21273]  do_syscall_64+0xcb/0x1e0
[  553.604243][T21273]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  553.610113][T21273] RIP: 0033:0x466459
[  553.613985][T21273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  553.633587][T21273] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  553.641975][T21273] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:38 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000e00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:38 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b21}, @mcast2}})

[  553.649927][T21273] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  553.657882][T21273] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  553.665845][T21273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  553.673797][T21273] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:39 executing program 2:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(0xffffffffffffffff)

21:32:39 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:39 executing program 0 (fault-call:8 fault-nth:87):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:39 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x5000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:39 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xd2020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:39 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  553.811447][T21289] xt_SECMARK: invalid mode: 0
[  553.813551][T21292] x_tables: duplicate underflow at hook 2
[  553.817288][T21293] xt_SECMARK: invalid mode: 0
[  553.840930][T21287] FAULT_INJECTION: forcing a failure.
[  553.840930][T21287] name failslab, interval 1, probability 0, space 0, times 0
[  553.845959][T21297] x_tables: duplicate underflow at hook 2
[  553.854022][T21287] CPU: 1 PID: 21287 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  553.869626][T21287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  553.879920][T21287] Call Trace:
[  553.883202][T21287]  dump_stack+0x1d8/0x24e
[  553.887689][T21287]  ? devkmsg_release+0x11c/0x11c
[  553.892615][T21287]  ? show_regs_print_info+0x12/0x12
[  553.897804][T21287]  ? vsnprintf+0x1cb4/0x1d60
[  553.902389][T21287]  should_fail+0x6f6/0x860
[  553.906784][T21287]  ? setup_fault_attr+0x3d0/0x3d0
[  553.911793][T21287]  ? __alloc_skb+0x75/0x4d0
[  553.916289][T21287]  should_failslab+0x5/0x20
[  553.920778][T21287]  kmem_cache_alloc+0x36/0x290
[  553.925529][T21287]  __alloc_skb+0x75/0x4d0
[  553.929852][T21287]  ? mutex_lock+0xa6/0x110
[  553.934245][T21287]  alloc_uevent_skb+0x73/0x220
[  553.938995][T21287]  kobject_uevent_env+0x972/0x1040
[  553.944090][T21287]  ? kernfs_get+0x55/0x90
[  553.948410][T21287]  net_rx_queue_update_kobjects+0x1ef/0x460
[  553.954305][T21287]  netdev_register_kobject+0x222/0x310
[  553.959769][T21287]  register_netdevice+0xbc7/0x1480
[  553.964873][T21287]  ? netdev_update_lockdep_key+0x10/0x10
[  553.970518][T21287]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  553.975529][T21287]  ? __rcu_read_lock+0x50/0x50
[  553.980278][T21287]  ? alloc_netdev_mqs+0xa0c/0xc60
[  553.985301][T21287]  ? vti6_locate+0x551/0x910
[  553.989878][T21287]  vti6_locate+0x610/0x910
[  553.994299][T21287]  ? cap_capable+0x23f/0x280
[  553.998915][T21287]  ? vti6_link_config+0x530/0x530
[  554.003921][T21287]  ? vti6_ioctl+0xa64/0x1b10
[  554.008526][T21287]  vti6_ioctl+0xa88/0x1b10
[  554.012931][T21287]  ? vti6_tnl_xmit+0x1720/0x1720
[  554.017866][T21287]  ? __rcu_read_lock+0x50/0x50
[  554.022620][T21287]  ? check_preemption_disabled+0x154/0x330
[  554.028415][T21287]  ? avc_has_extended_perms+0xb5e/0x1140
[  554.034069][T21287]  ? full_name_hash+0xb4/0xe0
[  554.038741][T21287]  dev_ifsioc+0x675/0xa70
[  554.043063][T21287]  ? mutex_lock+0xa6/0x110
[  554.047462][T21287]  ? dev_ioctl+0xab0/0xab0
[  554.051861][T21287]  dev_ioctl+0x558/0xab0
[  554.056109][T21287]  sock_ioctl+0x677/0x760
[  554.060417][T21287]  ? sock_poll+0x2f0/0x2f0
[  554.064832][T21287]  ? memset+0x1f/0x40
[  554.068825][T21287]  ? fsnotify+0x1332/0x13f0
[  554.073307][T21287]  ? sock_poll+0x2f0/0x2f0
[  554.077708][T21287]  do_vfs_ioctl+0x76a/0x1720
[  554.082285][T21287]  ? selinux_file_ioctl+0x72f/0x990
[  554.087470][T21287]  ? ioctl_preallocate+0x250/0x250
[  554.092615][T21287]  ? __fget+0x37b/0x3c0
[  554.096773][T21287]  ? vfs_write+0x422/0x4e0
[  554.101185][T21287]  ? fget_many+0x20/0x20
[  554.105426][T21287]  ? debug_smp_processor_id+0x20/0x20
[  554.110788][T21287]  ? security_file_ioctl+0x9d/0xb0
[  554.115887][T21287]  __x64_sys_ioctl+0xd4/0x110
[  554.120555][T21287]  do_syscall_64+0xcb/0x1e0
[  554.125047][T21287]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  554.130922][T21287] RIP: 0033:0x466459
[  554.134803][T21287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  554.154411][T21287] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
21:32:39 executing program 0 (fault-call:8 fault-nth:88):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  554.162811][T21287] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  554.170761][T21287] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  554.178713][T21287] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  554.186664][T21287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  554.194619][T21287] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:39 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:39 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xd6020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:39 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b22}, @mcast2}})

[  554.213003][T21288] EXT4-fs (loop1): Can't read superblock on 2nd try
[  554.234943][T21291] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  554.246714][T21305] x_tables: duplicate underflow at hook 2
[  554.288349][T21313] x_tables: duplicate underflow at hook 2
[  554.294179][T21288] EXT4-fs (loop1): Can't read superblock on 2nd try
[  554.305480][T21307] FAULT_INJECTION: forcing a failure.
[  554.305480][T21307] name failslab, interval 1, probability 0, space 0, times 0
[  554.318772][T21307] CPU: 0 PID: 21307 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  554.329020][T21307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  554.339064][T21307] Call Trace:
[  554.342339][T21307]  dump_stack+0x1d8/0x24e
[  554.346656][T21307]  ? devkmsg_release+0x11c/0x11c
[  554.351607][T21307]  ? show_regs_print_info+0x12/0x12
[  554.356789][T21307]  should_fail+0x6f6/0x860
[  554.361180][T21307]  ? setup_fault_attr+0x3d0/0x3d0
[  554.366185][T21307]  ? alloc_uevent_skb+0x73/0x220
[  554.371100][T21307]  should_failslab+0x5/0x20
[  554.375580][T21307]  __kmalloc_track_caller+0x5d/0x2e0
[  554.380844][T21307]  ? kmem_cache_alloc+0x115/0x290
[  554.385851][T21307]  ? alloc_uevent_skb+0x73/0x220
[  554.390924][T21307]  __alloc_skb+0xaf/0x4d0
[  554.395253][T21307]  ? mutex_lock+0xa6/0x110
[  554.399660][T21307]  alloc_uevent_skb+0x73/0x220
[  554.404424][T21307]  kobject_uevent_env+0x972/0x1040
[  554.409523][T21307]  ? kernfs_get+0x55/0x90
[  554.413834][T21307]  net_rx_queue_update_kobjects+0x1ef/0x460
[  554.419707][T21307]  netdev_register_kobject+0x222/0x310
[  554.425153][T21307]  register_netdevice+0xbc7/0x1480
[  554.430325][T21307]  ? netdev_update_lockdep_key+0x10/0x10
[  554.436010][T21307]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  554.441276][T21307]  ? __rcu_read_lock+0x50/0x50
[  554.446078][T21307]  ? alloc_netdev_mqs+0xa0c/0xc60
[  554.451084][T21307]  ? vti6_locate+0x551/0x910
[  554.455654][T21307]  vti6_locate+0x610/0x910
[  554.460062][T21307]  ? cap_capable+0x23f/0x280
[  554.464692][T21307]  ? vti6_link_config+0x530/0x530
[  554.469705][T21307]  ? vti6_ioctl+0xa64/0x1b10
[  554.474280][T21307]  vti6_ioctl+0xa88/0x1b10
[  554.478684][T21307]  ? vti6_tnl_xmit+0x1720/0x1720
[  554.483604][T21307]  ? __rcu_read_lock+0x50/0x50
[  554.488347][T21307]  ? check_preemption_disabled+0x154/0x330
[  554.494135][T21307]  ? avc_has_extended_perms+0xb5e/0x1140
[  554.499826][T21307]  ? full_name_hash+0xb4/0xe0
[  554.504532][T21307]  dev_ifsioc+0x675/0xa70
[  554.508866][T21307]  ? mutex_lock+0xa6/0x110
[  554.513409][T21307]  ? dev_ioctl+0xab0/0xab0
[  554.517805][T21307]  dev_ioctl+0x558/0xab0
[  554.522035][T21307]  sock_ioctl+0x677/0x760
[  554.526354][T21307]  ? sock_poll+0x2f0/0x2f0
[  554.530751][T21307]  ? memset+0x1f/0x40
[  554.534710][T21307]  ? fsnotify+0x1332/0x13f0
[  554.539188][T21307]  ? sock_poll+0x2f0/0x2f0
[  554.543591][T21307]  do_vfs_ioctl+0x76a/0x1720
[  554.548169][T21307]  ? selinux_file_ioctl+0x72f/0x990
[  554.553467][T21307]  ? ioctl_preallocate+0x250/0x250
[  554.558559][T21307]  ? __fget+0x37b/0x3c0
[  554.562699][T21307]  ? vfs_write+0x422/0x4e0
[  554.567098][T21307]  ? fget_many+0x20/0x20
[  554.571322][T21307]  ? debug_smp_processor_id+0x20/0x20
[  554.576675][T21307]  ? security_file_ioctl+0x9d/0xb0
[  554.581777][T21307]  __x64_sys_ioctl+0xd4/0x110
[  554.586442][T21307]  do_syscall_64+0xcb/0x1e0
[  554.590931][T21307]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  554.596809][T21307] RIP: 0033:0x466459
[  554.600679][T21307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  554.620265][T21307] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  554.628663][T21307] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:39 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:39 executing program 0 (fault-call:8 fault-nth:89):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:39 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xdb000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:39 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x1000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:39 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x8000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:39 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xe4010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  554.636621][T21307] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  554.645526][T21307] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  554.653478][T21307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  554.661432][T21307] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:40 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xe8030000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:40 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b23}, @mcast2}})

21:32:40 executing program 2:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000e00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:40 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x9000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  554.712494][T21322] x_tables: duplicate underflow at hook 2
[  554.714044][T21324] x_tables: duplicate underflow at hook 2
[  554.729034][T21327] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:40 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xa000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  554.774731][T21335] FAULT_INJECTION: forcing a failure.
[  554.774731][T21335] name failslab, interval 1, probability 0, space 0, times 0
[  554.792155][T21339] EXT4-fs (loop2): Can't read superblock on 2nd try
[  554.798889][T21335] CPU: 1 PID: 21335 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  554.809119][T21335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  554.812556][T21344] x_tables: duplicate underflow at hook 2
[  554.819264][T21335] Call Trace:
[  554.819286][T21335]  dump_stack+0x1d8/0x24e
[  554.819297][T21335]  ? devkmsg_release+0x11c/0x11c
[  554.819306][T21335]  ? show_regs_print_info+0x12/0x12
[  554.819318][T21335]  should_fail+0x6f6/0x860
[  554.819327][T21335]  ? setup_fault_attr+0x3d0/0x3d0
[  554.819337][T21335]  ? kzalloc+0x1d/0x30
[  554.819353][T21335]  should_failslab+0x5/0x20
[  554.860811][T21335]  __kmalloc+0x5f/0x2f0
[  554.864964][T21335]  kzalloc+0x1d/0x30
[  554.868875][T21335]  kobject_get_path+0xb3/0x190
[  554.873618][T21335]  kobject_uevent_env+0x269/0x1040
[  554.878740][T21335]  ? kobject_uevent_env+0x2bd/0x1040
[  554.884015][T21335]  ? kernfs_get+0x55/0x90
[  554.888328][T21335]  net_rx_queue_update_kobjects+0x1ef/0x460
[  554.894329][T21335]  netdev_register_kobject+0x222/0x310
[  554.899775][T21335]  register_netdevice+0xbc7/0x1480
[  554.904874][T21335]  ? netdev_update_lockdep_key+0x10/0x10
[  554.910486][T21335]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  554.915512][T21335]  ? __rcu_read_lock+0x50/0x50
[  554.920332][T21335]  ? alloc_netdev_mqs+0xa0c/0xc60
[  554.925342][T21335]  ? vti6_locate+0x551/0x910
[  554.929963][T21335]  vti6_locate+0x610/0x910
[  554.934373][T21335]  ? cap_capable+0x23f/0x280
[  554.939493][T21335]  ? vti6_link_config+0x530/0x530
[  554.944500][T21335]  ? vti6_ioctl+0xa64/0x1b10
[  554.949071][T21335]  vti6_ioctl+0xa88/0x1b10
[  554.953474][T21335]  ? vti6_tnl_xmit+0x1720/0x1720
[  554.958399][T21335]  ? __rcu_read_lock+0x50/0x50
[  554.963164][T21335]  ? check_preemption_disabled+0x154/0x330
[  554.968953][T21335]  ? avc_has_extended_perms+0xb5e/0x1140
[  554.974706][T21335]  ? full_name_hash+0xb4/0xe0
[  554.979460][T21335]  dev_ifsioc+0x675/0xa70
[  554.983774][T21335]  ? mutex_lock+0xa6/0x110
[  554.988177][T21335]  ? dev_ioctl+0xab0/0xab0
[  554.992659][T21335]  dev_ioctl+0x558/0xab0
[  554.996960][T21335]  sock_ioctl+0x677/0x760
[  555.001283][T21335]  ? sock_poll+0x2f0/0x2f0
[  555.005796][T21335]  ? memset+0x1f/0x40
[  555.009760][T21335]  ? fsnotify+0x1332/0x13f0
[  555.014252][T21335]  ? sock_poll+0x2f0/0x2f0
[  555.018664][T21335]  do_vfs_ioctl+0x76a/0x1720
[  555.023242][T21335]  ? selinux_file_ioctl+0x72f/0x990
[  555.028436][T21335]  ? ioctl_preallocate+0x250/0x250
[  555.033533][T21335]  ? __fget+0x37b/0x3c0
[  555.037681][T21335]  ? vfs_write+0x422/0x4e0
[  555.042087][T21335]  ? fget_many+0x20/0x20
[  555.046315][T21335]  ? debug_smp_processor_id+0x20/0x20
[  555.051676][T21335]  ? security_file_ioctl+0x9d/0xb0
[  555.056786][T21335]  __x64_sys_ioctl+0xd4/0x110
[  555.061478][T21335]  do_syscall_64+0xcb/0x1e0
[  555.065979][T21335]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  555.071858][T21335] RIP: 0033:0x466459
21:32:40 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001100900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  555.075730][T21335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  555.095389][T21335] RSP: 002b:00007faa9aa7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  555.103784][T21335] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459
[  555.112011][T21335] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:40 executing program 0 (fault-call:8 fault-nth:90):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:40 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xea030000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:40 executing program 2:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0xea03000000000000}, @mcast2}})

[  555.119968][T21335] RBP: 00007faa9aa7f1d0 R08: 0000000000000000 R09: 0000000000000000
[  555.127923][T21335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  555.135914][T21335] R13: 00007ffe4ada44ff R14: 00007faa9aa7f300 R15: 0000000000022000
21:32:40 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf6020000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:40 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xb000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  555.185183][T21353] x_tables: duplicate underflow at hook 2
[  555.220866][T21347] FAULT_INJECTION: forcing a failure.
[  555.220866][T21347] name failslab, interval 1, probability 0, space 0, times 0
[  555.234452][T21356] EXT4-fs (loop1): Can't read superblock on 2nd try
[  555.246804][T21347] CPU: 0 PID: 21347 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  555.250185][T21364] x_tables: duplicate underflow at hook 2
[  555.257150][T21347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  555.257154][T21347] Call Trace:
[  555.257176][T21347]  dump_stack+0x1d8/0x24e
[  555.257196][T21347]  ? devkmsg_release+0x11c/0x11c
[  555.285567][T21347]  ? show_regs_print_info+0x12/0x12
[  555.290760][T21347]  ? vti6_locate+0x610/0x910
[  555.295400][T21347]  ? dev_ifsioc+0x675/0xa70
[  555.299895][T21347]  ? dev_ioctl+0x558/0xab0
[  555.304402][T21347]  ? sock_ioctl+0x677/0x760
[  555.308898][T21347]  should_fail+0x6f6/0x860
[  555.313298][T21347]  ? setup_fault_attr+0x3d0/0x3d0
[  555.318328][T21347]  ? kobject_set_name_vargs+0x5d/0x110
[  555.323768][T21347]  should_failslab+0x5/0x20
[  555.328347][T21347]  __kmalloc_track_caller+0x5d/0x2e0
[  555.333624][T21347]  kvasprintf+0xd6/0x180
[  555.337845][T21347]  ? asan.module_ctor+0x10/0x10
[  555.342703][T21347]  ? slab_free_freelist_hook+0x7b/0x150
[  555.348235][T21347]  ? kvasprintf_const+0x4d/0x170
[  555.353183][T21347]  kobject_set_name_vargs+0x5d/0x110
[  555.358450][T21347]  kobject_init_and_add+0xdb/0x190
[  555.363561][T21347]  ? kobject_add+0x210/0x210
[  555.368165][T21347]  ? kernfs_get+0x55/0x90
[  555.372498][T21347]  netdev_queue_update_kobjects+0x16e/0x3c0
[  555.378386][T21347]  netdev_register_kobject+0x263/0x310
[  555.383829][T21347]  register_netdevice+0xbc7/0x1480
[  555.388933][T21347]  ? netdev_update_lockdep_key+0x10/0x10
[  555.394605][T21347]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  555.399619][T21347]  ? __rcu_read_lock+0x50/0x50
[  555.404367][T21347]  ? alloc_netdev_mqs+0xa0c/0xc60
[  555.409373][T21347]  ? vti6_locate+0x551/0x910
[  555.413971][T21347]  vti6_locate+0x610/0x910
[  555.418481][T21347]  ? cap_capable+0x23f/0x280
[  555.423059][T21347]  ? vti6_link_config+0x530/0x530
[  555.428074][T21347]  ? vti6_ioctl+0xa64/0x1b10
[  555.432643][T21347]  vti6_ioctl+0xa88/0x1b10
[  555.437046][T21347]  ? vti6_tnl_xmit+0x1720/0x1720
[  555.441974][T21347]  ? __rcu_read_lock+0x50/0x50
[  555.446724][T21347]  ? check_preemption_disabled+0x154/0x330
[  555.452522][T21347]  ? avc_has_extended_perms+0xb5e/0x1140
[  555.458145][T21347]  ? full_name_hash+0xb4/0xe0
[  555.462812][T21347]  dev_ifsioc+0x675/0xa70
[  555.467124][T21347]  ? mutex_lock+0xa6/0x110
[  555.471528][T21347]  ? dev_ioctl+0xab0/0xab0
[  555.475929][T21347]  dev_ioctl+0x558/0xab0
[  555.480154][T21347]  sock_ioctl+0x677/0x760
[  555.484465][T21347]  ? sock_poll+0x2f0/0x2f0
[  555.488858][T21347]  ? memset+0x1f/0x40
[  555.492850][T21347]  ? fsnotify+0x1332/0x13f0
[  555.497350][T21347]  ? sock_poll+0x2f0/0x2f0
[  555.501753][T21347]  do_vfs_ioctl+0x76a/0x1720
[  555.506323][T21347]  ? selinux_file_ioctl+0x72f/0x990
[  555.511507][T21347]  ? ioctl_preallocate+0x250/0x250
[  555.516597][T21347]  ? __fget+0x37b/0x3c0
[  555.520732][T21347]  ? vfs_write+0x422/0x4e0
[  555.525146][T21347]  ? fget_many+0x20/0x20
[  555.529398][T21347]  ? debug_smp_processor_id+0x20/0x20
[  555.534772][T21347]  ? security_file_ioctl+0x9d/0xb0
[  555.539891][T21347]  __x64_sys_ioctl+0xd4/0x110
[  555.544558][T21347]  do_syscall_64+0xcb/0x1e0
[  555.549042][T21347]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  555.554911][T21347] RIP: 0033:0x466459
[  555.558782][T21347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  555.578370][T21347] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
21:32:40 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf8010000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:40 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xc000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:40 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b24}, @mcast2}})

21:32:40 executing program 0 (fault-call:8 fault-nth:91):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  555.586765][T21347] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  555.594830][T21347] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  555.602801][T21347] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  555.610760][T21347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  555.618716][T21347] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  555.628256][T21347] kobject: can not set name properly!
[  555.657039][T21367] FAULT_INJECTION: forcing a failure.
[  555.657039][T21367] name failslab, interval 1, probability 0, space 0, times 0
[  555.670737][T21367] CPU: 1 PID: 21367 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  555.680984][T21367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  555.691043][T21367] Call Trace:
[  555.694428][T21367]  dump_stack+0x1d8/0x24e
[  555.698757][T21367]  ? devkmsg_release+0x11c/0x11c
21:32:40 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xf8030000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:40 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfb060000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:41 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfc060000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  555.703698][T21367]  ? show_regs_print_info+0x12/0x12
[  555.708899][T21367]  ? vti6_locate+0x610/0x910
[  555.713501][T21367]  ? dev_ifsioc+0x675/0xa70
[  555.718002][T21367]  ? dev_ioctl+0x558/0xab0
[  555.722409][T21367]  ? sock_ioctl+0x677/0x760
[  555.727009][T21367]  should_fail+0x6f6/0x860
[  555.731425][T21367]  ? setup_fault_attr+0x3d0/0x3d0
[  555.736438][T21367]  ? kobject_set_name_vargs+0x5d/0x110
[  555.741887][T21367]  should_failslab+0x5/0x20
[  555.746390][T21367]  __kmalloc_track_caller+0x5d/0x2e0
[  555.751677][T21367]  kvasprintf+0xd6/0x180
[  555.755922][T21367]  ? asan.module_ctor+0x10/0x10
[  555.760765][T21367]  ? slab_free_freelist_hook+0x7b/0x150
[  555.766368][T21367]  ? kvasprintf_const+0x4d/0x170
[  555.771294][T21367]  kobject_set_name_vargs+0x5d/0x110
[  555.776566][T21367]  kobject_init_and_add+0xdb/0x190
[  555.781675][T21367]  ? kobject_add+0x210/0x210
[  555.786264][T21367]  ? kernfs_get+0x55/0x90
[  555.790598][T21367]  netdev_queue_update_kobjects+0x16e/0x3c0
[  555.796521][T21367]  netdev_register_kobject+0x263/0x310
[  555.802009][T21367]  register_netdevice+0xbc7/0x1480
[  555.807121][T21367]  ? netdev_update_lockdep_key+0x10/0x10
[  555.812743][T21367]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  555.817748][T21367]  ? __rcu_read_lock+0x50/0x50
[  555.822492][T21367]  ? alloc_netdev_mqs+0xa0c/0xc60
[  555.827495][T21367]  ? vti6_locate+0x551/0x910
[  555.832077][T21367]  vti6_locate+0x610/0x910
[  555.836482][T21367]  ? cap_capable+0x23f/0x280
[  555.841066][T21367]  ? vti6_link_config+0x530/0x530
[  555.846081][T21367]  ? vti6_ioctl+0xa64/0x1b10
[  555.850670][T21367]  vti6_ioctl+0xa88/0x1b10
[  555.855082][T21367]  ? vti6_tnl_xmit+0x1720/0x1720
[  555.860015][T21367]  ? __rcu_read_lock+0x50/0x50
[  555.864777][T21367]  ? check_preemption_disabled+0x154/0x330
[  555.870568][T21367]  ? avc_has_extended_perms+0xb5e/0x1140
[  555.876201][T21367]  ? full_name_hash+0xb4/0xe0
[  555.880871][T21367]  dev_ifsioc+0x675/0xa70
[  555.885208][T21367]  ? mutex_lock+0xa6/0x110
[  555.889630][T21367]  ? dev_ioctl+0xab0/0xab0
[  555.894052][T21367]  dev_ioctl+0x558/0xab0
[  555.898312][T21367]  sock_ioctl+0x677/0x760
[  555.902770][T21367]  ? sock_poll+0x2f0/0x2f0
[  555.907184][T21367]  ? memset+0x1f/0x40
[  555.911182][T21367]  ? fsnotify+0x1332/0x13f0
[  555.915669][T21367]  ? sock_poll+0x2f0/0x2f0
[  555.920217][T21367]  do_vfs_ioctl+0x76a/0x1720
[  555.924804][T21367]  ? selinux_file_ioctl+0x72f/0x990
[  555.929985][T21367]  ? ioctl_preallocate+0x250/0x250
[  555.935085][T21367]  ? __fget+0x37b/0x3c0
[  555.939235][T21367]  ? vfs_write+0x422/0x4e0
[  555.943643][T21367]  ? fget_many+0x20/0x20
[  555.947867][T21367]  ? debug_smp_processor_id+0x20/0x20
[  555.953221][T21367]  ? security_file_ioctl+0x9d/0xb0
[  555.958315][T21367]  __x64_sys_ioctl+0xd4/0x110
[  555.962979][T21367]  do_syscall_64+0xcb/0x1e0
[  555.967463][T21367]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  555.973334][T21367] RIP: 0033:0x466459
[  555.977204][T21367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  555.996789][T21367] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
21:32:41 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001200900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:41 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0xfe030000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:41 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xd000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:41 executing program 0 (fault-call:8 fault-nth:92):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:41 executing program 2 (fault-call:2 fault-nth:0):
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

[  556.005192][T21367] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  556.013145][T21367] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  556.021103][T21367] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  556.029066][T21367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  556.037028][T21367] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  556.047837][T21367] kobject: can not set name properly!
21:32:41 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xe000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:41 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  556.077276][T21356] EXT4-fs (loop1): Can't read superblock on 2nd try
[  556.127108][T21394] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  556.138048][T21399] FAULT_INJECTION: forcing a failure.
[  556.138048][T21399] name failslab, interval 1, probability 0, space 0, times 0
[  556.157549][T21394] EXT4-fs (loop2): re-mounted. Opts: (null)
[  556.160255][T21399] CPU: 1 PID: 21399 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  556.173701][T21399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  556.183749][T21399] Call Trace:
[  556.187173][T21399]  dump_stack+0x1d8/0x24e
[  556.191491][T21399]  ? devkmsg_release+0x11c/0x11c
[  556.196408][T21399]  ? show_regs_print_info+0x12/0x12
[  556.201584][T21399]  should_fail+0x6f6/0x860
[  556.205975][T21399]  ? setup_fault_attr+0x3d0/0x3d0
[  556.210974][T21399]  ? __kernfs_new_node+0xdb/0x6d0
[  556.215973][T21399]  should_failslab+0x5/0x20
[  556.220454][T21399]  kmem_cache_alloc+0x36/0x290
[  556.225191][T21399]  ? memcpy+0x38/0x50
[  556.229150][T21399]  __kernfs_new_node+0xdb/0x6d0
[  556.233978][T21399]  ? kernfs_new_node+0x160/0x160
[  556.238887][T21399]  ? vsnprintf+0x1e4/0x1d60
[  556.243364][T21399]  ? make_kgid+0x24f/0x390
[  556.247756][T21399]  ? from_kuid_munged+0x3b0/0x3b0
[  556.252762][T21399]  kernfs_create_dir_ns+0x90/0x220
[  556.257848][T21399]  sysfs_create_dir_ns+0x181/0x390
[  556.262934][T21399]  ? sysfs_warn_dup+0xa0/0xa0
[  556.267587][T21399]  kobject_add_internal+0x595/0xbd0
[  556.272759][T21399]  kobject_init_and_add+0x123/0x190
[  556.277943][T21399]  ? kobject_add+0x210/0x210
[  556.282508][T21399]  ? kernfs_get+0x55/0x90
[  556.286814][T21399]  netdev_queue_update_kobjects+0x16e/0x3c0
[  556.292702][T21399]  netdev_register_kobject+0x263/0x310
[  556.298134][T21399]  register_netdevice+0xbc7/0x1480
[  556.303239][T21399]  ? netdev_update_lockdep_key+0x10/0x10
[  556.308844][T21399]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  556.313850][T21399]  ? __rcu_read_lock+0x50/0x50
[  556.318584][T21399]  ? alloc_netdev_mqs+0xa0c/0xc60
[  556.323581][T21399]  ? vti6_locate+0x551/0x910
[  556.328141][T21399]  vti6_locate+0x610/0x910
[  556.332553][T21399]  ? cap_capable+0x23f/0x280
[  556.337127][T21399]  ? vti6_link_config+0x530/0x530
[  556.342131][T21399]  ? vti6_ioctl+0xa64/0x1b10
[  556.346696][T21399]  vti6_ioctl+0xa88/0x1b10
[  556.351090][T21399]  ? vti6_tnl_xmit+0x1720/0x1720
[  556.356004][T21399]  ? __rcu_read_lock+0x50/0x50
[  556.360744][T21399]  ? check_preemption_disabled+0x154/0x330
[  556.366524][T21399]  ? avc_has_extended_perms+0xb5e/0x1140
[  556.372131][T21399]  ? full_name_hash+0xb4/0xe0
[  556.376783][T21399]  dev_ifsioc+0x675/0xa70
[  556.381087][T21399]  ? mutex_lock+0xa6/0x110
[  556.385476][T21399]  ? dev_ioctl+0xab0/0xab0
[  556.389868][T21399]  dev_ioctl+0x558/0xab0
[  556.394085][T21399]  sock_ioctl+0x677/0x760
[  556.398404][T21399]  ? sock_poll+0x2f0/0x2f0
[  556.402810][T21399]  ? memset+0x1f/0x40
[  556.406782][T21399]  ? fsnotify+0x1332/0x13f0
[  556.411269][T21399]  ? sock_poll+0x2f0/0x2f0
[  556.415658][T21399]  do_vfs_ioctl+0x76a/0x1720
[  556.420229][T21399]  ? selinux_file_ioctl+0x72f/0x990
[  556.425400][T21399]  ? ioctl_preallocate+0x250/0x250
[  556.430483][T21399]  ? __fget+0x37b/0x3c0
[  556.434627][T21399]  ? vfs_write+0x422/0x4e0
[  556.439015][T21399]  ? fget_many+0x20/0x20
[  556.443233][T21399]  ? debug_smp_processor_id+0x20/0x20
[  556.448579][T21399]  ? security_file_ioctl+0x9d/0xb0
[  556.453688][T21399]  __x64_sys_ioctl+0xd4/0x110
[  556.458347][T21399]  do_syscall_64+0xcb/0x1e0
[  556.462837][T21399]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  556.468704][T21399] RIP: 0033:0x466459
[  556.472574][T21399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  556.492152][T21399] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  556.500535][T21399] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  556.508479][T21399] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  556.516422][T21399] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
21:32:41 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b25}, @mcast2}})

21:32:41 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:41 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x10000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:41 executing program 0 (fault-call:8 fault-nth:93):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:41 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  556.524365][T21399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  556.532314][T21399] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  556.561747][T21397] EXT4-fs (loop1): Can't read superblock on 2nd try
[  556.569081][T21399] kobject_add_internal failed for tx-0 (error: -12 parent: queues)
[  556.599395][T21412] FAULT_INJECTION: forcing a failure.
[  556.599395][T21412] name failslab, interval 1, probability 0, space 0, times 0
[  556.612120][T21412] CPU: 1 PID: 21412 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  556.622358][T21412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  556.632398][T21412] Call Trace:
[  556.635677][T21412]  dump_stack+0x1d8/0x24e
[  556.640008][T21412]  ? devkmsg_release+0x11c/0x11c
[  556.644950][T21412]  ? show_regs_print_info+0x12/0x12
[  556.650133][T21412]  ? __kasan_kmalloc+0x1a3/0x1e0
[  556.655044][T21412]  ? kmem_cache_alloc+0x115/0x290
[  556.660044][T21412]  ? __kernfs_new_node+0xdb/0x6d0
[  556.665042][T21412]  ? kernfs_create_dir_ns+0x90/0x220
[  556.670296][T21412]  ? sysfs_create_dir_ns+0x181/0x390
[  556.675555][T21412]  should_fail+0x6f6/0x860
[  556.679944][T21412]  ? setup_fault_attr+0x3d0/0x3d0
[  556.684942][T21412]  ? mutex_unlock+0x19/0x40
[  556.689417][T21412]  ? __kernfs_new_node+0xdb/0x6d0
[  556.694414][T21412]  should_failslab+0x5/0x20
[  556.698918][T21412]  kmem_cache_alloc+0x36/0x290
[  556.703674][T21412]  __kernfs_new_node+0xdb/0x6d0
[  556.708499][T21412]  ? kernfs_new_node+0x160/0x160
[  556.713412][T21412]  ? _raw_spin_lock+0xa3/0x1b0
[  556.718155][T21412]  ? security_kernfs_init_security+0x9a/0xb0
[  556.724131][T21412]  kernfs_new_node+0x95/0x160
[  556.728870][T21412]  __kernfs_create_file+0x45/0x260
[  556.733982][T21412]  sysfs_add_file_mode_ns+0x293/0x340
[  556.739343][T21412]  internal_create_group+0x560/0xf10
[  556.744616][T21412]  ? sysfs_create_dir_ns+0x181/0x390
[  556.749877][T21412]  ? sysfs_create_dir_ns+0x1c7/0x390
[  556.755133][T21412]  ? sysfs_create_group+0x20/0x20
[  556.760131][T21412]  sysfs_create_groups+0x5d/0x130
[  556.765132][T21412]  kobject_add_internal+0x708/0xbd0
[  556.770315][T21412]  kobject_init_and_add+0x123/0x190
[  556.775502][T21412]  ? kobject_add+0x210/0x210
[  556.780065][T21412]  ? kernfs_get+0x55/0x90
[  556.784369][T21412]  netdev_queue_update_kobjects+0x16e/0x3c0
[  556.790237][T21412]  netdev_register_kobject+0x263/0x310
[  556.795670][T21412]  register_netdevice+0xbc7/0x1480
[  556.800757][T21412]  ? netdev_update_lockdep_key+0x10/0x10
[  556.806359][T21412]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  556.811356][T21412]  ? __rcu_read_lock+0x50/0x50
[  556.816091][T21412]  ? alloc_netdev_mqs+0xa0c/0xc60
[  556.821089][T21412]  ? vti6_locate+0x551/0x910
[  556.825652][T21412]  vti6_locate+0x610/0x910
[  556.830043][T21412]  ? cap_capable+0x23f/0x280
[  556.834606][T21412]  ? vti6_link_config+0x530/0x530
[  556.839602][T21412]  ? vti6_ioctl+0xa64/0x1b10
[  556.844182][T21412]  vti6_ioctl+0xa88/0x1b10
[  556.848601][T21412]  ? vti6_tnl_xmit+0x1720/0x1720
[  556.853522][T21412]  ? __rcu_read_lock+0x50/0x50
[  556.858286][T21412]  ? check_preemption_disabled+0x154/0x330
[  556.864074][T21412]  ? avc_has_extended_perms+0xb5e/0x1140
[  556.869684][T21412]  ? full_name_hash+0xb4/0xe0
[  556.874361][T21412]  dev_ifsioc+0x675/0xa70
[  556.878674][T21412]  ? mutex_lock+0xa6/0x110
[  556.883063][T21412]  ? dev_ioctl+0xab0/0xab0
[  556.887468][T21412]  dev_ioctl+0x558/0xab0
[  556.891686][T21412]  sock_ioctl+0x677/0x760
[  556.896004][T21412]  ? sock_poll+0x2f0/0x2f0
[  556.900394][T21412]  ? memset+0x1f/0x40
[  556.904348][T21412]  ? fsnotify+0x1332/0x13f0
[  556.908822][T21412]  ? sock_poll+0x2f0/0x2f0
[  556.913231][T21412]  do_vfs_ioctl+0x76a/0x1720
[  556.917796][T21412]  ? selinux_file_ioctl+0x72f/0x990
[  556.922969][T21412]  ? ioctl_preallocate+0x250/0x250
[  556.928058][T21412]  ? __fget+0x37b/0x3c0
[  556.932186][T21412]  ? vfs_write+0x422/0x4e0
[  556.936574][T21412]  ? fget_many+0x20/0x20
[  556.940790][T21412]  ? debug_smp_processor_id+0x20/0x20
[  556.946137][T21412]  ? security_file_ioctl+0x9d/0xb0
[  556.951222][T21412]  __x64_sys_ioctl+0xd4/0x110
[  556.955873][T21412]  do_syscall_64+0xcb/0x1e0
[  556.960353][T21412]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  556.966218][T21412] RIP: 0033:0x466459
[  556.970088][T21412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  556.989668][T21412] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  556.998051][T21412] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  557.006034][T21412] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  557.013980][T21412] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  557.021925][T21412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  557.029881][T21412] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  557.048263][T21412] kobject_add_internal failed for tx-0 (error: -12 parent: queues)
21:32:42 executing program 0 (fault-call:8 fault-nth:94):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:42 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019002200900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:42 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:42 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x11000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:42 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b26}, @mcast2}})

[  557.110279][T21413] EXT4-fs (loop1): Can't read superblock on 2nd try
[  557.186453][T21426] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  557.211169][T21432] FAULT_INJECTION: forcing a failure.
[  557.211169][T21432] name failslab, interval 1, probability 0, space 0, times 0
[  557.224925][T21437] EXT4-fs (loop2): re-mounted. Opts: (null)
[  557.225349][T21432] CPU: 0 PID: 21432 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  557.241064][T21432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  557.251107][T21432] Call Trace:
[  557.254386][T21432]  dump_stack+0x1d8/0x24e
[  557.258708][T21432]  ? devkmsg_release+0x11c/0x11c
[  557.269144][T21432]  ? mutex_unlock+0x19/0x40
[  557.276462][T21432]  ? show_regs_print_info+0x12/0x12
[  557.281945][T21432]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  557.289788][T21432]  should_fail+0x6f6/0x860
[  557.295509][T21432]  ? setup_fault_attr+0x3d0/0x3d0
[  557.301401][T21432]  ? _raw_spin_lock+0xa3/0x1b0
[  557.306143][T21432]  ? __kernfs_new_node+0xdb/0x6d0
[  557.311142][T21432]  should_failslab+0x5/0x20
[  557.315619][T21432]  kmem_cache_alloc+0x36/0x290
[  557.320358][T21432]  __kernfs_new_node+0xdb/0x6d0
[  557.325186][T21432]  ? mutex_lock+0xa6/0x110
[  557.329676][T21432]  ? kernfs_new_node+0x160/0x160
[  557.334589][T21432]  ? kernfs_activate+0x3fc/0x420
[  557.339524][T21432]  kernfs_new_node+0x95/0x160
[  557.344189][T21432]  __kernfs_create_file+0x45/0x260
[  557.349374][T21432]  sysfs_add_file_mode_ns+0x293/0x340
[  557.354721][T21432]  internal_create_group+0x560/0xf10
[  557.359980][T21432]  ? sysfs_create_dir_ns+0x181/0x390
[  557.365239][T21432]  ? sysfs_create_dir_ns+0x1c7/0x390
[  557.370501][T21432]  ? sysfs_create_group+0x20/0x20
[  557.375501][T21432]  sysfs_create_groups+0x5d/0x130
[  557.380506][T21432]  kobject_add_internal+0x708/0xbd0
[  557.385685][T21432]  kobject_init_and_add+0x123/0x190
[  557.390966][T21432]  ? kobject_add+0x210/0x210
[  557.395548][T21432]  ? __irqentry_text_end+0x1fc3fa/0x1fc3fa
[  557.401339][T21432]  netdev_queue_update_kobjects+0x16e/0x3c0
[  557.407228][T21432]  netdev_register_kobject+0x263/0x310
[  557.412749][T21432]  register_netdevice+0xbc7/0x1480
[  557.417837][T21432]  ? netdev_update_lockdep_key+0x10/0x10
[  557.423444][T21432]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  557.428459][T21432]  ? __rcu_read_lock+0x50/0x50
[  557.433200][T21432]  ? alloc_netdev_mqs+0xa0c/0xc60
[  557.438201][T21432]  ? vti6_locate+0x551/0x910
[  557.442782][T21432]  vti6_locate+0x610/0x910
[  557.447175][T21432]  ? cap_capable+0x23f/0x280
[  557.451738][T21432]  ? vti6_link_config+0x530/0x530
[  557.456735][T21432]  ? vti6_ioctl+0xa64/0x1b10
[  557.461300][T21432]  vti6_ioctl+0xa88/0x1b10
[  557.465711][T21432]  ? vti6_tnl_xmit+0x1720/0x1720
[  557.470626][T21432]  ? __rcu_read_lock+0x50/0x50
[  557.475368][T21432]  ? check_preemption_disabled+0x154/0x330
[  557.481149][T21432]  ? avc_has_extended_perms+0xb5e/0x1140
[  557.486771][T21432]  ? full_name_hash+0xb4/0xe0
[  557.491425][T21432]  dev_ifsioc+0x675/0xa70
[  557.495727][T21432]  ? mutex_lock+0xa6/0x110
[  557.500134][T21432]  ? dev_ioctl+0xab0/0xab0
[  557.504546][T21432]  dev_ioctl+0x558/0xab0
[  557.508785][T21432]  sock_ioctl+0x677/0x760
[  557.513091][T21432]  ? sock_poll+0x2f0/0x2f0
[  557.517486][T21432]  ? memset+0x1f/0x40
[  557.521459][T21432]  ? fsnotify+0x1332/0x13f0
[  557.525949][T21432]  ? sock_poll+0x2f0/0x2f0
[  557.530341][T21432]  do_vfs_ioctl+0x76a/0x1720
[  557.534921][T21432]  ? selinux_file_ioctl+0x72f/0x990
[  557.540108][T21432]  ? ioctl_preallocate+0x250/0x250
[  557.545211][T21432]  ? __fget+0x37b/0x3c0
[  557.549345][T21432]  ? vfs_write+0x422/0x4e0
[  557.553736][T21432]  ? fget_many+0x20/0x20
[  557.557954][T21432]  ? debug_smp_processor_id+0x20/0x20
[  557.563298][T21432]  ? security_file_ioctl+0x9d/0xb0
[  557.568387][T21432]  __x64_sys_ioctl+0xd4/0x110
[  557.573041][T21432]  do_syscall_64+0xcb/0x1e0
[  557.577521][T21432]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  557.583406][T21432] RIP: 0033:0x466459
[  557.587289][T21432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  557.606876][T21432] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  557.615264][T21432] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  557.623210][T21432] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:42 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:42 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x12000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:42 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x20000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:43 executing program 0 (fault-call:8 fault-nth:95):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  557.631176][T21432] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  557.639120][T21432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  557.647082][T21432] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  557.669488][T21432] kobject_add_internal failed for tx-0 (error: -12 parent: queues)
21:32:43 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019002500900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:43 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x1000000, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0)
r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0)
ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000040))
preadv(r3, &(0x7f0000000080), 0x0, 0xd9f, 0x2)
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2)

21:32:43 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b27}, @mcast2}})

21:32:43 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x25000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  557.719826][T21445] secmark_tg_check: 29 callbacks suppressed
[  557.719832][T21445] xt_SECMARK: invalid mode: 0
[  557.735800][T21444] EXT4-fs (loop1): Can't read superblock on 2nd try
[  557.765074][T21452] FAULT_INJECTION: forcing a failure.
[  557.765074][T21452] name failslab, interval 1, probability 0, space 0, times 0
[  557.769487][T21453] xt_SECMARK: invalid mode: 0
[  557.779974][T21452] CPU: 1 PID: 21452 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  557.792797][T21452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  557.802832][T21452] Call Trace:
[  557.806195][T21452]  dump_stack+0x1d8/0x24e
[  557.810527][T21452]  ? devkmsg_release+0x11c/0x11c
[  557.815442][T21452]  ? mutex_unlock+0x19/0x40
[  557.819923][T21452]  ? show_regs_print_info+0x12/0x12
[  557.825132][T21452]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  557.831186][T21452]  should_fail+0x6f6/0x860
[  557.835838][T21452]  ? setup_fault_attr+0x3d0/0x3d0
[  557.840860][T21452]  ? _raw_spin_lock+0xa3/0x1b0
[  557.845641][T21452]  ? __kernfs_new_node+0xdb/0x6d0
[  557.850646][T21452]  should_failslab+0x5/0x20
[  557.855132][T21452]  kmem_cache_alloc+0x36/0x290
[  557.859896][T21452]  __kernfs_new_node+0xdb/0x6d0
[  557.864734][T21452]  ? mutex_lock+0xa6/0x110
[  557.869133][T21452]  ? kernfs_new_node+0x160/0x160
[  557.874057][T21452]  ? kernfs_activate+0x3fc/0x420
[  557.878981][T21452]  kernfs_new_node+0x95/0x160
[  557.883724][T21452]  __kernfs_create_file+0x45/0x260
[  557.888961][T21452]  sysfs_add_file_mode_ns+0x293/0x340
[  557.894446][T21452]  internal_create_group+0x560/0xf10
[  557.899916][T21452]  ? sysfs_create_dir_ns+0x181/0x390
[  557.905180][T21452]  ? sysfs_create_dir_ns+0x1c7/0x390
[  557.910441][T21452]  ? sysfs_create_group+0x20/0x20
[  557.915439][T21452]  sysfs_create_groups+0x5d/0x130
[  557.920472][T21452]  kobject_add_internal+0x708/0xbd0
[  557.925694][T21452]  kobject_init_and_add+0x123/0x190
[  557.930899][T21452]  ? kobject_add+0x210/0x210
[  557.935469][T21452]  ? kernfs_get+0x55/0x90
[  557.939789][T21452]  netdev_queue_update_kobjects+0x16e/0x3c0
[  557.945663][T21452]  netdev_register_kobject+0x263/0x310
[  557.951097][T21452]  register_netdevice+0xbc7/0x1480
[  557.956195][T21452]  ? netdev_update_lockdep_key+0x10/0x10
[  557.961861][T21452]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  557.966873][T21452]  ? __rcu_read_lock+0x50/0x50
[  557.971620][T21452]  ? alloc_netdev_mqs+0xa0c/0xc60
[  557.976634][T21452]  ? vti6_locate+0x551/0x910
[  557.981200][T21452]  vti6_locate+0x610/0x910
[  557.985590][T21452]  ? cap_capable+0x23f/0x280
[  557.990170][T21452]  ? vti6_link_config+0x530/0x530
[  557.995690][T21452]  ? vti6_ioctl+0xa64/0x1b10
[  558.000269][T21452]  vti6_ioctl+0xa88/0x1b10
[  558.004663][T21452]  ? vti6_tnl_xmit+0x1720/0x1720
[  558.009606][T21452]  ? __rcu_read_lock+0x50/0x50
[  558.014347][T21452]  ? check_preemption_disabled+0x154/0x330
[  558.020150][T21452]  ? avc_has_extended_perms+0xb5e/0x1140
[  558.025797][T21452]  ? full_name_hash+0xb4/0xe0
[  558.030461][T21452]  dev_ifsioc+0x675/0xa70
[  558.034796][T21452]  ? mutex_lock+0xa6/0x110
[  558.039284][T21452]  ? dev_ioctl+0xab0/0xab0
[  558.043690][T21452]  dev_ioctl+0x558/0xab0
[  558.048038][T21452]  sock_ioctl+0x677/0x760
[  558.052350][T21452]  ? sock_poll+0x2f0/0x2f0
[  558.056744][T21452]  ? memset+0x1f/0x40
[  558.060703][T21452]  ? fsnotify+0x1332/0x13f0
[  558.065187][T21452]  ? sock_poll+0x2f0/0x2f0
[  558.069577][T21452]  do_vfs_ioctl+0x76a/0x1720
[  558.074300][T21452]  ? selinux_file_ioctl+0x72f/0x990
[  558.079488][T21452]  ? ioctl_preallocate+0x250/0x250
[  558.084706][T21452]  ? __fget+0x37b/0x3c0
[  558.088847][T21452]  ? vfs_write+0x422/0x4e0
[  558.093267][T21452]  ? fget_many+0x20/0x20
[  558.097487][T21452]  ? debug_smp_processor_id+0x20/0x20
[  558.102953][T21452]  ? security_file_ioctl+0x9d/0xb0
[  558.108053][T21452]  __x64_sys_ioctl+0xd4/0x110
[  558.113320][T21452]  do_syscall_64+0xcb/0x1e0
[  558.117811][T21452]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  558.123674][T21452] RIP: 0033:0x466459
[  558.127547][T21452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  558.147125][T21452] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  558.155525][T21452] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:43 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x5], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:43 executing program 0 (fault-call:8 fault-nth:96):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  558.163471][T21452] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  558.171417][T21452] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  558.179709][T21452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  558.187654][T21452] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  558.197719][T21452] kobject_add_internal failed for tx-0 (error: -12 parent: queues)
[  558.230255][T21457] FAULT_INJECTION: forcing a failure.
[  558.230255][T21457] name failslab, interval 1, probability 0, space 0, times 0
[  558.243293][T21457] CPU: 0 PID: 21457 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  558.253615][T21457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  558.263802][T21457] Call Trace:
[  558.267110][T21457]  dump_stack+0x1d8/0x24e
[  558.271428][T21457]  ? devkmsg_release+0x11c/0x11c
[  558.276362][T21457]  ? mutex_unlock+0x19/0x40
[  558.280844][T21457]  ? show_regs_print_info+0x12/0x12
[  558.286021][T21457]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  558.292133][T21457]  should_fail+0x6f6/0x860
[  558.296671][T21457]  ? setup_fault_attr+0x3d0/0x3d0
[  558.301698][T21457]  ? _raw_spin_lock+0xa3/0x1b0
[  558.306450][T21457]  ? __kernfs_new_node+0xdb/0x6d0
[  558.311458][T21457]  should_failslab+0x5/0x20
[  558.315953][T21457]  kmem_cache_alloc+0x36/0x290
[  558.320724][T21457]  __kernfs_new_node+0xdb/0x6d0
[  558.325556][T21457]  ? mutex_lock+0xa6/0x110
[  558.329955][T21457]  ? kernfs_new_node+0x160/0x160
[  558.335495][T21457]  ? kernfs_activate+0x3fc/0x420
[  558.340418][T21457]  kernfs_new_node+0x95/0x160
[  558.345101][T21457]  __kernfs_create_file+0x45/0x260
[  558.350200][T21457]  sysfs_add_file_mode_ns+0x293/0x340
[  558.355575][T21457]  internal_create_group+0x560/0xf10
[  558.360860][T21457]  ? sysfs_create_dir_ns+0x181/0x390
[  558.366134][T21457]  ? sysfs_create_dir_ns+0x1c7/0x390
[  558.371396][T21457]  ? sysfs_create_group+0x20/0x20
[  558.376400][T21457]  sysfs_create_groups+0x5d/0x130
[  558.381410][T21457]  kobject_add_internal+0x708/0xbd0
[  558.386595][T21457]  kobject_init_and_add+0x123/0x190
[  558.391800][T21457]  ? kobject_add+0x210/0x210
[  558.396380][T21457]  ? kernfs_get+0x55/0x90
[  558.400716][T21457]  netdev_queue_update_kobjects+0x16e/0x3c0
[  558.406600][T21457]  netdev_register_kobject+0x263/0x310
[  558.412043][T21457]  register_netdevice+0xbc7/0x1480
[  558.417138][T21457]  ? netdev_update_lockdep_key+0x10/0x10
[  558.422756][T21457]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  558.427765][T21457]  ? __rcu_read_lock+0x50/0x50
[  558.432532][T21457]  ? alloc_netdev_mqs+0xa0c/0xc60
[  558.437706][T21457]  ? vti6_locate+0x551/0x910
[  558.442274][T21457]  vti6_locate+0x610/0x910
[  558.446672][T21457]  ? cap_capable+0x23f/0x280
[  558.451242][T21457]  ? vti6_link_config+0x530/0x530
[  558.456252][T21457]  ? vti6_ioctl+0xa64/0x1b10
[  558.460818][T21457]  vti6_ioctl+0xa88/0x1b10
[  558.465221][T21457]  ? vti6_tnl_xmit+0x1720/0x1720
[  558.470145][T21457]  ? __rcu_read_lock+0x50/0x50
[  558.474911][T21457]  ? check_preemption_disabled+0x154/0x330
[  558.480782][T21457]  ? avc_has_extended_perms+0xb5e/0x1140
[  558.486396][T21457]  ? full_name_hash+0xb4/0xe0
[  558.491054][T21457]  dev_ifsioc+0x675/0xa70
[  558.495361][T21457]  ? mutex_lock+0xa6/0x110
[  558.499753][T21457]  ? dev_ioctl+0xab0/0xab0
[  558.504180][T21457]  dev_ioctl+0x558/0xab0
[  558.512577][T21457]  sock_ioctl+0x677/0x760
[  558.516886][T21457]  ? sock_poll+0x2f0/0x2f0
[  558.521282][T21457]  ? memset+0x1f/0x40
[  558.525273][T21457]  ? fsnotify+0x1332/0x13f0
[  558.529778][T21457]  ? sock_poll+0x2f0/0x2f0
[  558.534209][T21457]  do_vfs_ioctl+0x76a/0x1720
[  558.538793][T21457]  ? selinux_file_ioctl+0x72f/0x990
[  558.543970][T21457]  ? ioctl_preallocate+0x250/0x250
[  558.549059][T21457]  ? __fget+0x37b/0x3c0
[  558.553193][T21457]  ? vfs_write+0x422/0x4e0
[  558.557593][T21457]  ? fget_many+0x20/0x20
[  558.561820][T21457]  ? debug_smp_processor_id+0x20/0x20
[  558.567184][T21457]  ? security_file_ioctl+0x9d/0xb0
[  558.572281][T21457]  __x64_sys_ioctl+0xd4/0x110
[  558.576945][T21457]  do_syscall_64+0xcb/0x1e0
[  558.581518][T21457]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  558.587407][T21457] RIP: 0033:0x466459
[  558.591629][T21457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  558.611213][T21457] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  558.619746][T21457] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
21:32:43 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  558.627710][T21457] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  558.635690][T21457] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  558.643640][T21457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  558.651675][T21457] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:43 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x40000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:43 executing program 0 (fault-call:8 fault-nth:97):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:44 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b28}, @mcast2}})

[  558.683403][T21465] xt_SECMARK: invalid mode: 0
[  558.689756][T21457] kobject_add_internal failed for tx-0 (error: -12 parent: queues)
[  558.691672][T21469] xt_SECMARK: invalid mode: 0
[  558.702755][T21467] xt_check_table_hooks: 6 callbacks suppressed
[  558.702761][T21467] x_tables: duplicate underflow at hook 2
21:32:44 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x48000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  558.738975][T21468] EXT4-fs (loop1): Can't read superblock on 2nd try
[  558.760861][T21458] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  558.761625][T21479] x_tables: duplicate underflow at hook 2
[  558.777108][T21478] FAULT_INJECTION: forcing a failure.
[  558.777108][T21478] name failslab, interval 1, probability 0, space 0, times 0
[  558.785493][T21480] xt_SECMARK: invalid mode: 0
[  558.791767][T21478] CPU: 1 PID: 21478 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  558.804698][T21478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  558.814738][T21478] Call Trace:
[  558.818453][T21478]  dump_stack+0x1d8/0x24e
[  558.822762][T21478]  ? devkmsg_release+0x11c/0x11c
[  558.827934][T21478]  ? mutex_unlock+0x19/0x40
[  558.832421][T21478]  ? show_regs_print_info+0x12/0x12
[  558.837592][T21478]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  558.843641][T21478]  should_fail+0x6f6/0x860
[  558.848082][T21478]  ? setup_fault_attr+0x3d0/0x3d0
[  558.853437][T21478]  ? _raw_spin_lock+0xa3/0x1b0
[  558.858910][T21478]  ? __kernfs_new_node+0xdb/0x6d0
[  558.863926][T21478]  should_failslab+0x5/0x20
[  558.868411][T21478]  kmem_cache_alloc+0x36/0x290
[  558.873259][T21478]  __kernfs_new_node+0xdb/0x6d0
[  558.878087][T21478]  ? mutex_lock+0xa6/0x110
[  558.882479][T21478]  ? kernfs_new_node+0x160/0x160
[  558.887389][T21478]  ? kernfs_activate+0x3fc/0x420
[  558.892398][T21478]  kernfs_new_node+0x95/0x160
[  558.897052][T21478]  __kernfs_create_file+0x45/0x260
[  558.902163][T21478]  sysfs_add_file_mode_ns+0x293/0x340
[  558.907519][T21478]  internal_create_group+0x560/0xf10
[  558.912783][T21478]  ? sysfs_create_dir_ns+0x181/0x390
[  558.918038][T21478]  ? sysfs_create_dir_ns+0x1c7/0x390
[  558.923292][T21478]  ? sysfs_create_group+0x20/0x20
[  558.928301][T21478]  sysfs_create_groups+0x5d/0x130
[  558.933319][T21478]  kobject_add_internal+0x708/0xbd0
[  558.938493][T21478]  kobject_init_and_add+0x123/0x190
[  558.943664][T21478]  ? kobject_add+0x210/0x210
[  558.948227][T21478]  ? kernfs_get+0x55/0x90
[  558.952533][T21478]  netdev_queue_update_kobjects+0x16e/0x3c0
[  558.958492][T21478]  netdev_register_kobject+0x263/0x310
[  558.963947][T21478]  register_netdevice+0xbc7/0x1480
[  558.969211][T21478]  ? netdev_update_lockdep_key+0x10/0x10
[  558.974828][T21478]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  558.979826][T21478]  ? __rcu_read_lock+0x50/0x50
[  558.984561][T21478]  ? alloc_netdev_mqs+0xa0c/0xc60
[  558.989579][T21478]  ? vti6_locate+0x551/0x910
[  558.994140][T21478]  vti6_locate+0x610/0x910
[  558.998546][T21478]  ? cap_capable+0x23f/0x280
[  559.003108][T21478]  ? vti6_link_config+0x530/0x530
[  559.008121][T21478]  ? vti6_ioctl+0xa64/0x1b10
[  559.014512][T21478]  vti6_ioctl+0xa88/0x1b10
[  559.018920][T21478]  ? vti6_tnl_xmit+0x1720/0x1720
[  559.023836][T21478]  ? __rcu_read_lock+0x50/0x50
[  559.028602][T21478]  ? check_preemption_disabled+0x154/0x330
[  559.034396][T21478]  ? avc_has_extended_perms+0xb5e/0x1140
[  559.040000][T21478]  ? full_name_hash+0xb4/0xe0
[  559.044651][T21478]  dev_ifsioc+0x675/0xa70
[  559.048956][T21478]  ? mutex_lock+0xa6/0x110
[  559.053343][T21478]  ? dev_ioctl+0xab0/0xab0
[  559.057733][T21478]  dev_ioctl+0x558/0xab0
[  559.061948][T21478]  sock_ioctl+0x677/0x760
[  559.066270][T21478]  ? sock_poll+0x2f0/0x2f0
[  559.070756][T21478]  ? memset+0x1f/0x40
[  559.074728][T21478]  ? fsnotify+0x1332/0x13f0
[  559.079208][T21478]  ? sock_poll+0x2f0/0x2f0
[  559.083599][T21478]  do_vfs_ioctl+0x76a/0x1720
[  559.088165][T21478]  ? selinux_file_ioctl+0x72f/0x990
[  559.093347][T21478]  ? ioctl_preallocate+0x250/0x250
[  559.098430][T21478]  ? __fget+0x37b/0x3c0
[  559.102566][T21478]  ? vfs_write+0x422/0x4e0
[  559.106957][T21478]  ? fget_many+0x20/0x20
[  559.111175][T21478]  ? debug_smp_processor_id+0x20/0x20
[  559.116520][T21478]  ? security_file_ioctl+0x9d/0xb0
[  559.121612][T21478]  __x64_sys_ioctl+0xd4/0x110
[  559.126275][T21478]  do_syscall_64+0xcb/0x1e0
[  559.130756][T21478]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  559.136620][T21478] RIP: 0033:0x466459
[  559.140494][T21478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  559.160070][T21478] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  559.168454][T21478] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  559.176400][T21478] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
21:32:44 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x4c000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  559.184344][T21478] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  559.192287][T21478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  559.200230][T21478] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
[  559.210945][T21478] kobject_add_internal failed for tx-0 (error: -12 parent: queues)
[  559.227773][T21459] EXT4-fs (loop2): re-mounted. Opts: (null)
[  559.233824][T21487] x_tables: duplicate underflow at hook 2
21:32:44 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019002e00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:44 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:44 executing program 0 (fault-call:8 fault-nth:98):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:44 executing program 2:
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)=0x5)
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x10d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0xee00, 0x0, r2)
setresgid(0x0, r2, 0x0)
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r4=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0xee00, 0x0, r4)
setresgid(0x0, r4, 0x0)
r5 = getegid()
lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0xb}, [{0x2, 0x2, 0xee00}, {}], {0x4, 0x5}, [{0x8, 0x6, r2}, {0x8, 0x0, 0xee00}, {0x8, 0x2, 0xee00}, {0x8, 0x2, r4}, {0x8, 0x2, r5}, {0x8, 0x0, 0xee00}], {}, {0x20, 0x1}}, 0x64, 0x1)
fcntl$getownex(r0, 0x10, &(0x7f0000000080))
fdatasync(r0)

21:32:44 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x60000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  559.241104][T21468] EXT4-fs (loop1): Can't read superblock on 2nd try
[  559.262216][T21491] x_tables: duplicate underflow at hook 2
[  559.314876][T21495] FAULT_INJECTION: forcing a failure.
[  559.314876][T21495] name failslab, interval 1, probability 0, space 0, times 0
[  559.331576][T21497] xt_SECMARK: invalid mode: 0
[  559.334873][T21495] CPU: 1 PID: 21495 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  559.342219][T21503] x_tables: duplicate underflow at hook 2
[  559.346532][T21495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  559.346536][T21495] Call Trace:
[  559.346558][T21495]  dump_stack+0x1d8/0x24e
[  559.346576][T21495]  ? devkmsg_release+0x11c/0x11c
[  559.361604][T21504] xt_SECMARK: invalid mode: 0
[  559.362341][T21495]  ? mutex_unlock+0x19/0x40
[  559.362360][T21495]  ? show_regs_print_info+0x12/0x12
[  559.389274][T21495]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  559.395324][T21495]  should_fail+0x6f6/0x860
[  559.399906][T21495]  ? setup_fault_attr+0x3d0/0x3d0
[  559.404908][T21495]  ? _raw_spin_lock+0xa3/0x1b0
[  559.409653][T21495]  ? __kernfs_new_node+0xdb/0x6d0
[  559.414710][T21495]  should_failslab+0x5/0x20
[  559.419247][T21495]  kmem_cache_alloc+0x36/0x290
[  559.424012][T21495]  __kernfs_new_node+0xdb/0x6d0
[  559.428900][T21495]  ? mutex_lock+0xa6/0x110
[  559.433457][T21495]  ? kernfs_new_node+0x160/0x160
[  559.438619][T21495]  ? kernfs_activate+0x3fc/0x420
[  559.443540][T21495]  kernfs_new_node+0x95/0x160
[  559.448206][T21495]  __kernfs_create_file+0x45/0x260
[  559.453301][T21495]  sysfs_add_file_mode_ns+0x293/0x340
[  559.458657][T21495]  internal_create_group+0x560/0xf10
[  559.463965][T21495]  ? sysfs_create_dir_ns+0x181/0x390
[  559.469236][T21495]  ? sysfs_create_dir_ns+0x1c7/0x390
[  559.474504][T21495]  ? sysfs_create_group+0x20/0x20
[  559.479515][T21495]  sysfs_create_groups+0x5d/0x130
[  559.484530][T21495]  kobject_add_internal+0x708/0xbd0
[  559.489745][T21495]  kobject_init_and_add+0x123/0x190
[  559.494969][T21495]  ? kobject_add+0x210/0x210
[  559.499538][T21495]  ? kernfs_get+0x55/0x90
[  559.503857][T21495]  netdev_queue_update_kobjects+0x16e/0x3c0
[  559.509745][T21495]  netdev_register_kobject+0x263/0x310
[  559.515218][T21495]  register_netdevice+0xbc7/0x1480
[  559.520323][T21495]  ? netdev_update_lockdep_key+0x10/0x10
[  559.525951][T21495]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  559.530983][T21495]  ? __rcu_read_lock+0x50/0x50
[  559.535754][T21495]  ? alloc_netdev_mqs+0xa0c/0xc60
[  559.540765][T21495]  ? vti6_locate+0x551/0x910
[  559.545414][T21495]  vti6_locate+0x610/0x910
[  559.549884][T21495]  ? cap_capable+0x23f/0x280
[  559.554473][T21495]  ? vti6_link_config+0x530/0x530
[  559.559473][T21495]  ? vti6_ioctl+0xa64/0x1b10
[  559.564045][T21495]  vti6_ioctl+0xa88/0x1b10
[  559.568499][T21495]  ? vti6_tnl_xmit+0x1720/0x1720
[  559.573433][T21495]  ? __rcu_read_lock+0x50/0x50
[  559.578184][T21495]  ? check_preemption_disabled+0x154/0x330
[  559.583984][T21495]  ? avc_has_extended_perms+0xb5e/0x1140
[  559.589634][T21495]  ? full_name_hash+0xb4/0xe0
[  559.594307][T21495]  dev_ifsioc+0x675/0xa70
[  559.598634][T21495]  ? mutex_lock+0xa6/0x110
[  559.603037][T21495]  ? dev_ioctl+0xab0/0xab0
[  559.607446][T21495]  dev_ioctl+0x558/0xab0
[  559.611673][T21495]  sock_ioctl+0x677/0x760
[  559.615978][T21495]  ? sock_poll+0x2f0/0x2f0
[  559.620374][T21495]  ? memset+0x1f/0x40
[  559.624347][T21495]  ? fsnotify+0x1332/0x13f0
[  559.628832][T21495]  ? sock_poll+0x2f0/0x2f0
[  559.633244][T21495]  do_vfs_ioctl+0x76a/0x1720
[  559.637816][T21495]  ? selinux_file_ioctl+0x72f/0x990
[  559.642994][T21495]  ? ioctl_preallocate+0x250/0x250
[  559.648174][T21495]  ? __fget+0x37b/0x3c0
[  559.652461][T21495]  ? vfs_write+0x422/0x4e0
[  559.656872][T21495]  ? fget_many+0x20/0x20
[  559.661116][T21495]  ? debug_smp_processor_id+0x20/0x20
[  559.666483][T21495]  ? security_file_ioctl+0x9d/0xb0
[  559.671582][T21495]  __x64_sys_ioctl+0xd4/0x110
[  559.676238][T21495]  do_syscall_64+0xcb/0x1e0
[  559.680720][T21495]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  559.686589][T21495] RIP: 0033:0x466459
[  559.690470][T21495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
21:32:45 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x8], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x68000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b29}, @mcast2}})

21:32:45 executing program 0 (fault-call:8 fault-nth:99):
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  559.710118][T21495] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  559.718513][T21495] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  559.726476][T21495] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  559.734517][T21495] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  559.742507][T21495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  559.750485][T21495] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:45 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x6c000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
statx(r0, &(0x7f00000000c0)='./file0\x00', 0x800, 0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000380)={[{@nfs_export_off}, {@index_off}, {@index_off}], [{@euid_gt={'euid>', r1}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@dont_appraise}, {@obj_type={'obj_type', 0x3d, '\\]['}}, {@obj_type}]})

[  559.769368][T21495] kobject_add_internal failed for tx-0 (error: -12 parent: queues)
[  559.799816][T21500] EXT4-fs (loop1): Can't read superblock on 2nd try
[  559.801741][T21501] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
21:32:45 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x9], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  559.818138][T21511] x_tables: duplicate underflow at hook 2
[  559.835768][T21514] xt_SECMARK: invalid mode: 0
[  559.856271][T21518] xt_SECMARK: invalid mode: 0
[  559.860407][T21520] x_tables: duplicate underflow at hook 2
[  559.874953][T21513] FAULT_INJECTION: forcing a failure.
[  559.874953][T21513] name failslab, interval 1, probability 0, space 0, times 0
[  559.887860][T21513] CPU: 1 PID: 21513 Comm: syz-executor.0 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  559.898359][T21513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  559.908429][T21513] Call Trace:
[  559.911724][T21513]  dump_stack+0x1d8/0x24e
[  559.916045][T21513]  ? devkmsg_release+0x11c/0x11c
[  559.921258][T21513]  ? show_regs_print_info+0x12/0x12
[  559.926724][T21513]  ? mutex_lock+0xa6/0x110
[  559.931139][T21513]  ? mutex_trylock+0xb0/0xb0
[  559.935706][T21513]  ? idr_get_free+0x740/0x900
[  559.940360][T21513]  should_fail+0x6f6/0x860
[  559.944754][T21513]  ? setup_fault_attr+0x3d0/0x3d0
[  559.949757][T21513]  ? selinux_kernfs_init_security+0x1b2/0x7e0
[  559.955802][T21513]  ? __kernfs_new_node+0xdb/0x6d0
[  559.960803][T21513]  should_failslab+0x5/0x20
[  559.965283][T21513]  kmem_cache_alloc+0x36/0x290
[  559.970023][T21513]  __kernfs_new_node+0xdb/0x6d0
[  559.974856][T21513]  ? kernfs_new_node+0x160/0x160
[  559.979769][T21513]  ? security_kernfs_init_security+0x9a/0xb0
[  559.985724][T21513]  ? mutex_lock+0xa6/0x110
[  559.990113][T21513]  ? mutex_trylock+0xb0/0xb0
[  559.994681][T21513]  kernfs_new_node+0x95/0x160
[  559.999336][T21513]  __kernfs_create_file+0x45/0x260
[  560.004424][T21513]  sysfs_add_file_mode_ns+0x293/0x340
[  560.009775][T21513]  internal_create_group+0x560/0xf10
[  560.015036][T21513]  ? kobject_add+0x210/0x210
[  560.019604][T21513]  ? sysfs_create_group+0x20/0x20
[  560.024605][T21513]  ? kernfs_get+0x55/0x90
[  560.028918][T21513]  netdev_queue_update_kobjects+0x18c/0x3c0
[  560.034788][T21513]  netdev_register_kobject+0x263/0x310
[  560.040223][T21513]  register_netdevice+0xbc7/0x1480
[  560.045311][T21513]  ? netdev_update_lockdep_key+0x10/0x10
[  560.050919][T21513]  ? xdp_rxq_info_reg+0x18e/0x2f0
[  560.055932][T21513]  ? __rcu_read_lock+0x50/0x50
[  560.060692][T21513]  ? alloc_netdev_mqs+0xa0c/0xc60
[  560.065695][T21513]  ? vti6_locate+0x551/0x910
[  560.070257][T21513]  vti6_locate+0x610/0x910
[  560.074652][T21513]  ? cap_capable+0x23f/0x280
[  560.079233][T21513]  ? vti6_link_config+0x530/0x530
[  560.084234][T21513]  ? vti6_ioctl+0xa64/0x1b10
[  560.088798][T21513]  vti6_ioctl+0xa88/0x1b10
[  560.093198][T21513]  ? vti6_tnl_xmit+0x1720/0x1720
[  560.098111][T21513]  ? avc_has_extended_perms+0xb5e/0x1140
[  560.103717][T21513]  ? full_name_hash+0xb4/0xe0
[  560.108367][T21513]  dev_ifsioc+0x675/0xa70
[  560.112691][T21513]  ? mutex_lock+0x106/0x110
[  560.117166][T21513]  ? dev_ioctl+0xab0/0xab0
[  560.121580][T21513]  dev_ioctl+0x558/0xab0
[  560.125795][T21513]  sock_ioctl+0x677/0x760
[  560.130095][T21513]  ? sock_poll+0x2f0/0x2f0
[  560.134484][T21513]  ? memset+0x1f/0x40
[  560.138462][T21513]  ? fsnotify+0x1332/0x13f0
[  560.143372][T21513]  ? sock_poll+0x2f0/0x2f0
[  560.147762][T21513]  do_vfs_ioctl+0x76a/0x1720
[  560.152328][T21513]  ? selinux_file_ioctl+0x72f/0x990
[  560.157519][T21513]  ? ioctl_preallocate+0x250/0x250
[  560.162608][T21513]  ? __fget+0x37b/0x3c0
[  560.166737][T21513]  ? vfs_write+0x422/0x4e0
[  560.171128][T21513]  ? fget_many+0x20/0x20
[  560.175346][T21513]  ? debug_smp_processor_id+0x20/0x20
[  560.180798][T21513]  ? security_file_ioctl+0x9d/0xb0
[  560.185881][T21513]  __x64_sys_ioctl+0xd4/0x110
[  560.190533][T21513]  do_syscall_64+0xcb/0x1e0
[  560.195013][T21513]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  560.200882][T21513] RIP: 0033:0x466459
[  560.204781][T21513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  560.224362][T21513] RSP: 002b:00007faa9aaa0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  560.232747][T21513] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
[  560.240802][T21513] RDX: 00000000200000c0 RSI: 00000000000089f1 RDI: 0000000000000003
[  560.248749][T21513] RBP: 00007faa9aaa01d0 R08: 0000000000000000 R09: 0000000000000000
[  560.256698][T21513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  560.264662][T21513] R13: 00007ffe4ada44ff R14: 00007faa9aaa0300 R15: 0000000000022000
21:32:45 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019004800900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:45 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x74000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2a}, @mcast2}})

21:32:45 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xa], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:45 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x3ff}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4dd}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x3}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
open(&(0x7f0000000040)='./file0\x00', 0x40, 0x40)

21:32:45 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x7a000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  560.287925][T21519] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  560.298744][T21526] xt_SECMARK: invalid mode: 0
[  560.300436][T21500] EXT4-fs (loop1): Can't read superblock on 2nd try
[  560.312630][T21519] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:45 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:45 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xb], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xa0040000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xc], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  560.344540][T21532] x_tables: duplicate underflow at hook 2
[  560.384348][T21540] x_tables: duplicate underflow at hook 2
21:32:45 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x2}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

[  560.410130][T21544] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  560.432683][T21553] x_tables: duplicate underflow at hook 2
[  560.470515][T21552] EXT4-fs (loop1): Can't read superblock on 2nd try
[  560.481808][T21559] EXT4-fs (loop2): unsupported descriptor size 0
[  560.532259][T21559] EXT4-fs (loop2): unsupported descriptor size 0
[  560.540957][T21552] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:45 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019004c00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:45 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2b}, @mcast2}})

21:32:45 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4b47, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:45 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xd], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 2:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0)
ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040))
r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x1400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x104e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYRESOCT])
r2 = dup(r1)
r3 = open(&(0x7f0000000140)='./file0\x00', 0x224580, 0x2)
ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f00000000c0)={0x14, 0x8000000b, 0x15, 0x13, 0x6, 0x6, 0x3, 0xcb, 0xffffffffffffffff})
chdir(&(0x7f0000000280)='./file0\x00')
r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0)
preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r2)
r6 = socket(0x11, 0x800000003, 0x0)
bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
r8 = socket(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x50, 0x24, 0xd8b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, {0xa, 0x2, [0x0, 0x0, 0x0]}}]}]}, 0x50}}, 0x0)
sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x60, r5, 0x804, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x4)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
fdatasync(r1)

21:32:45 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xc0050000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xe], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4b49, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:45 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0xf8010000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:45 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5421, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:45 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:45 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x10], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:45 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2c}, @mcast2}})

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5450, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x11], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  560.770913][T21595] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  560.782715][T21593] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:46 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
rmdir(&(0x7f0000000040)='./file0\x00')
link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00')
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x2], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2d}, @mcast2}})

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5451, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  560.905405][T21606] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  560.919500][T21593] EXT4-fs (loop1): Can't read superblock on 2nd try
[  560.928745][T21595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21595 comm=syz-executor.2
21:32:46 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006800900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x12], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x3], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x25], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006c00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5452, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2e}, @mcast2}})

21:32:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  561.044189][T21627] EXT4-fs (loop1): Can't read superblock on 2nd try
[  561.068756][T21629] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5460, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x5], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019007400900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x48], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, &(0x7f0000000140), 0x1000, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0)
ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040))
ftruncate(r1, 0x7)
r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000040))
fcntl$setstatus(r2, 0x4, 0x80400)
openat(r0, &(0x7f00000000c0)='./file0\x00', 0x200000, 0x0)
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000040)=""/66)
chroot(&(0x7f0000000140)='./file0\x00')

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8910, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4c], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b2f}, @mcast2}})

[  561.148804][T21629] EXT4-fs (loop2): re-mounted. Opts: (null)
[  561.163753][T21646] EXT4-fs (loop1): Can't read superblock on 2nd try
[  561.176135][T21629] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:46 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x120, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
openat(r0, &(0x7f0000000040)='./file0\x00', 0x2, 0xc0)
r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0)
ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)={0x6, 0x2b, 0x4, 0x0, 0x3})
r2 = signalfd(r1, &(0x7f00000000c0)={[0x5]}, 0x8)
fdatasync(r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x1, r0, 0x5})

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8911, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x60], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x68], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  561.269027][T21667] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:46 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019007a00900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8913, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b30}, @mcast2}})

21:32:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6c], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  561.352608][T21686] EXT4-fs (loop2): couldn't mount RDWR because of unsupported optional features (12610000)
[  561.367361][T21667] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891d, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
clock_gettime(0x0, &(0x7f0000000840)={<r1=>0x0, <r2=>0x0})
recvmmsg(0xffffffffffffffff, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/174, 0xae}], 0x1}, 0x7}, {{&(0x7f0000000280)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000300)=""/36, 0x24}], 0x1, &(0x7f0000000380)=""/229, 0xe5}, 0x1}, {{&(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/220, 0xdc}, {&(0x7f0000000600)=""/151, 0x97}], 0x2, &(0x7f0000000700)=""/118, 0x76}}], 0x3, 0x141, &(0x7f0000000880)={r1, r2+60000000})
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891e, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x71], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x9], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x74], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  561.512946][T21686] EXT4-fs (loop2): Unrecognized mount option "" or missing value
[  561.520904][T21713] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:46 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e300900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xa], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b31}, @mcast2}})

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7a], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xba], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="ddff000000000082e36724e6f24caa846e0800"/31, 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
r1 = syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x210000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize}, {}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x9}}], [{@smackfshat={'smackfshat', 0x3d, 'ext4\x00'}}]}})
move_mount(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000380)='./file0\x00', 0x11)
fdatasync(r0)

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8920, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  561.607488][T21713] EXT4-fs (loop1): Can't read superblock on 2nd try
[  561.616967][T21730] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  561.635564][T21730] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xb], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xdb], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8921, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:46 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  561.671930][T21744] EXT4-fs (loop1): Can't read superblock on 2nd try
[  561.736807][T21765] ip6_vti0: mtu greater than device maximum
[  561.748451][T21766] ip6_vti0: mtu greater than device maximum
21:32:47 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b32}, @mcast2}})

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xc], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e400900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:47 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
syz_mount_image$msdos(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x6, 0x2, &(0x7f00000004c0)=[{&(0x7f00000003c0)="08c3c76018711b084313b18d75516efe9cc12afa73fedbbb47fdfb8759b72749c992765d7feb38e5584cc2e9810f3df754999531d20da35cd86d8ae1090c42d0c49bdf2dee97f6759f7669e45e99cdd6e372cc7743f5c9428473af5aba918395dd2d23eb138ff04786a6ab31fa6fc93eee80401748729674a0a75ec930fb63bf77b46fde458c97b677b22a0b23e09d9ec4772a89fa9f7c22caba5268a13c55bf19bc5f449dade0547dcff178135a440dd39f6c45269743ca", 0xb8, 0x800}, {&(0x7f0000000480)="0f14d8d1339367", 0x7, 0x8}], 0x200000, &(0x7f0000000040)={[{@nodots}, {@fat=@quiet}], [{@mask={'mask', 0x3d, 'MAY_READ'}}]})
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)=ANY=[@ANYBLOB="00fb4b01ffae62c7687cad3b4db97fb2fdbaf5c4f98ac013a48e90e2bf81287b96d695ca4f50b3bba01ea524c6f88f82cce77c90c606e29bc1db611ca90bb420a8e4d9335afcad8ec53ad5"], 0x4b, 0x3)
fdatasync(r0)

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x114], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  561.789077][T21768] EXT4-fs (loop2): unsupported descriptor size 0
[  561.795624][T21744] EXT4-fs (loop1): Can't read superblock on 2nd try
[  561.796828][T21768] fuse: Bad value for 'fd'
[  561.813399][T21775] fuse: Bad value for 'fd'
21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8924, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xd], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x134], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xe], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900e500900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  561.902626][T21785] EXT4-fs (loop1): Can't read superblock on 2nd try
[  561.910056][T21784] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  561.935367][T21784] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:47 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000040)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4dd}, {&(0x7f0000000280)="02000000030000000400000019000f006200040000000000000000000f002e89cdc9d24fd25f4d20e47fba683248fbc15b65db8deb19ea7a54412f0e7334fca1a4a352fb52fb991c6244156becfebb1ff01f8bbf6d83175113d2d5b5968c00000000000000000000000000000000382c386c824f5b0f6ad9a3f865e5a6c8c794a4a2dcae810ed96a59e615f23f5e274ff94c12e20883dbfba90f690010c9f49e1419316e12fb48fd9debc4253bda2959b7a645472b302e0af15e867705aa9041b72e92b02cef8e8f19dc0a50d0a847c0cac185c1b670", 0xd6, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4403}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b33}, @mcast2}})

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x140], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8929, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8930, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8931, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  561.949608][T21785] EXT4-fs (loop1): Can't read superblock on 2nd try
[  561.965378][T21801] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8932, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b34}, @mcast2}})

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x10], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x15a], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  562.052671][T21809] EXT4-fs (loop1): Can't read superblock on 2nd try
[  562.097352][T21809] EXT4-fs (loop1): Can't read superblock on 2nd try
[  562.110452][T21829] EXT4-fs (loop2): unsupported descriptor size 0
21:32:47 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000402900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:47 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x2)
syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x3, 0x3, &(0x7f0000000500)=[{&(0x7f0000000280)="212c69438cdf95b02628270edba87279c3cf6b6bc2cc99dba1c0de50fc6d2b0c5bb7c3e3b87fa430888b5a64c4604cffbffda2d782b41930259f0ba038932e6cbdd6db3c5eee3d77cea4e8a0181cf80015ab7bc3d7d08dafea0550a6b619768f912bd405b9d0e6fcdb1c673efd8801757c57f24c36d0290abc82e29afe5406a3669e61091e9422f9f057509b4a4614a13750eac9710debe0ac4ff39bdfe3cc295b97e17be76c828a34a13cd766e64d3954450abf55ba28a96e8150325713317d0cedab6d8c332c3df930871fc1205b1a0ecf596123b6cce7dbb2f45812204fef5a12e4dadf95934ba3", 0xe9, 0x4dda}, {&(0x7f0000000380)="2a0da60281938299a823acd31638113d2ec247d9ab9d9aa8ab8d8fb15e1e1d5d956ad1a601b8516e78d30cc0b4acccac5a5748be017f4aa234e90d8e262bf65072b7a7d9c4fe0e4ae7199349328bcb6baad1879a7d45838a5a93ef20017f314117ecd9566249f90acf268f2cfdb6501f15d2228949066794bb2206744ab11cf391783e6a142d2f3a14abd8ff7a92afacf2681a0dcf5ebfef70b3ea93b60f86f2c7aa2be18844ad82113b1ec8c76192888313549357e57c2b0762322839c57184744c512952fb36e079", 0xc9, 0x9}, {&(0x7f0000000480)="a56bac680795d04a7e69f63901e8e9547df6333c07eecf9c38f38f6d1657ff4f0490cca73acf320df54018275a21897218dd327f10c8b4ae2faeac5578c4f37cf834ff0588f9982d29eadada66c76501ccbddb24e4fc6d43f06b5850371fd58d04e502", 0x63}], 0x2, &(0x7f0000000140)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xee01}}], [{@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@measure}]})
open(&(0x7f0000000580)='./file0\x00', 0x40, 0x40)
fdatasync(r0)

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x11], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x17f], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b35}, @mcast2}})

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x12], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8937, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1bf], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x25], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  562.199610][T21829] EXT4-fs (loop2): unsupported descriptor size 0
21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8942, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x48], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000003900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  562.271503][T21850] EXT4-fs (loop1): Can't read superblock on 2nd try
[  562.289243][T21866] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  562.318311][T21866] EXT4-fs (loop2): re-mounted. Opts: (null)
[  562.324284][T21850] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1e4], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8943, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x45f3, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019000000900100000f0000090000000002100000060000000000080000655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000006f92f39b60ab97fc1d6a31600c9840acdbfff7829f20a869914ce4e10522f98671e5c69f0a3c347443246959", 0x92, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed410063a23cf0b2afbfb65fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x4000, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:47 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b36}, @mcast2}})

21:32:47 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000204900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x60], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1f8], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x226], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  562.363112][T21866] EXT4-fs (loop2): re-mounted. Opts: (null)
[  562.369073][T21883] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x2c0064, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x9, 0xa902)
ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000080)={0x4, 0x3})

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x236], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x68], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8948, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x265], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  562.456487][T21901] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  562.472829][T21895] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:47 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b37}, @mcast2}})

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8949, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000604900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x28c], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x74], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7a], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 2:
sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x26}, @void, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8084}, 0x24000000)
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x4, &(0x7f0000000200)=[{&(0x7f00000000c0)="200000000002000019000000900100000f0000000000000002000000060000000000080000800002000000000000005fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000280)="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", 0x107, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000040)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0xff}], 0x300080, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x894a, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x28e], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x1f8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b38}, @mcast2}})

21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x29a], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x300], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8970, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:47 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001004900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:47 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8971, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  562.637879][T21949] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:47 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2d2], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4a0], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  562.704713][T21949] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:48 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed03b78f86977852e900000000000004008000"/29, 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8990, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b39}, @mcast2}})

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x500], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8991, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2d6], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x5c0], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000005900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  562.823605][T21996] secmark_tg_check: 65 callbacks suppressed
[  562.823611][T21996] xt_SECMARK: invalid mode: 0
[  562.837000][T22001] xt_SECMARK: invalid mode: 0
[  562.855905][T21991] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:48 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3a}, @mcast2}})

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8992, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2f6], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  562.865736][T21999] EXT4-fs error (device loop2): ext4_fill_super:4590: inode #2: comm syz-executor.2: iget: root inode unallocated
[  562.885741][T21999] EXT4-fs (loop2): get root inode failed
[  562.894514][T21999] EXT4-fs (loop2): mount failed
[  562.896054][T22010] xt_SECMARK: invalid mode: 0
21:32:48 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000006900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:48 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
open(&(0x7f0000000040)='./file0\x00', 0x4200, 0xfa)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x600], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8993, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  562.920719][T22015] xt_SECMARK: invalid mode: 0
[  562.932825][T22014] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x300], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8994, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3b}, @mcast2}})

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x700], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x900], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  562.973300][T22026] xt_SECMARK: invalid mode: 0
[  562.986764][T22030] xt_SECMARK: invalid mode: 0
21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8995, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xa00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x358], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  563.024779][T22025] EXT4-fs (loop1): Can't read superblock on 2nd try
[  563.055468][T22048] xt_SECMARK: invalid mode: 0
[  563.067306][T22050] xt_SECMARK: invalid mode: 0
21:32:48 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000406900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  563.078920][T22044] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  563.094838][T22025] EXT4-fs (loop1): Can't read superblock on 2nd try
[  563.111014][T22064] xt_SECMARK: invalid mode: 0
[  563.116481][T22065] xt_SECMARK: invalid mode: 0
21:32:48 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xb00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3e8], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3c}, @mcast2}})

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xc00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3ea], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a3, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  563.146973][T22044] EXT4-fs (loop2): re-mounted. Opts: (null)
[  563.159910][T22067] EXT4-fs (loop2): re-mounted. Opts: (null)
[  563.172012][T22068] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000007900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  563.266107][T22068] EXT4-fs (loop1): Can't read superblock on 2nd try
[  563.291770][T22098] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xd00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3f8], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3d}, @mcast2}})

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000009900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xe00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3fe], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  563.312562][T22106] EXT4-fs (loop1): Can't read superblock on 2nd try
[  563.325512][T22098] EXT4-fs (loop2): re-mounted. Opts: (null)
[  563.350329][T22098] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40049409, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x1100], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x500], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3e}, @mcast2}})

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40086602, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  563.418934][T22115] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:48 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080))
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
r2 = syz_open_dev$vcsu(&(0x7f0000000380), 0x2, 0x406080)
ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000400)={0x6, &(0x7f00000003c0)=[{0x1, 0x8, 0x15, 0x81}, {0x4, 0xc1, 0x9, 0x4}, {0x1f, 0x0, 0x5, 0x1}, {0x7, 0x20, 0x6, 0x3}, {0x0, 0x7, 0x4, 0x9279}, {0x1, 0x80, 0x8, 0x82}]})
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', <r3=>0x0})
sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)={0x60, 0x0, 0x10, 0x0, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @void}}, [@mon_options, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x60}, 0x1, 0x0, 0x0, 0x4004000}, 0x44050)
sendmsg$NL80211_CMD_FLUSH_PMKSA(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xc16, 0x5c}}}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x840}, 0x8000)

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x1200], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x5c0], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900000a900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40087602, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x600], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  563.488269][T22115] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x2000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b3f}, @mcast2}})

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6fb], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x2500], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6fc], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  563.565416][T22144] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  563.587930][T22155] EXT4-fs (loop1): Can't read superblock on 2nd try
[  563.595056][T22144] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:48 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900000b900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x80086601, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b40}, @mcast2}})

21:32:48 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x700], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:48 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x80087601, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:48 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x20000004e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000140)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES16, @ANYBLOB="bc0d0fdc75cfed3de15dd803c4a005bdc10d456a6d62d933e3d81d25656be088cb07d4fd45552529bac3636e57829e5cd1d36766dff52403035a1aa3ed2f538b4e581a56f10ab86d7b5f82bbfcaf7e8cb274783756a03c1b3208596e9d5f6e801f07f1e509782991d9024c5f9f75fdace5707db81bd4df7bf54c238e0757a06fea5ae804c2309d10e9b28a4b54276774809084f27d7f1169572322ec628c024565b5c8b9bdb957f97523075cd8"])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
r1 = dup(r0)
lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fchownat(r1, &(0x7f0000000300)='./file0\x00', r2, 0xffffffffffffffff, 0x800)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0)
preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x400, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x100}, 0x1c)

[  563.637977][T22155] EXT4-fs (loop1): Can't read superblock on 2nd try
[  563.648563][T22175] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0045878, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x900], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4800], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xa00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  563.722590][T22193] xt_check_table_hooks: 44 callbacks suppressed
[  563.722596][T22193] x_tables: duplicate underflow at hook 2
[  563.754490][T22188] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xb00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900000c900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0045878, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4c00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  563.795683][T22206] EXT4-fs (loop2): Unrecognized mount option "01777777777777777777777����u��=�]�Ġ��Ejmb�3��%ek�����EU%)��cnW��\��gf��$Z��/S�NXV�
[  563.795683][T22206] �m{_����~��tx7V�<2Yn�_n���	x)��L_�u���p}���{�L#�W�o�Z��0�鲊KT'gt����}iW#"�b�Ee�ȹ��W�u#\�" or missing value
[  563.805383][T22213] x_tables: duplicate underflow at hook 2
[  563.828538][T22188] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:49 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b41}, @mcast2}})

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xc00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 2:
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00')

21:32:49 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900000d900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xd00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  563.909205][T22206] EXT4-fs (loop2): Unrecognized mount option "01777777777777777777777����u��=�]�Ġ��Ejmb�3��%ek�����EU%)��cnW��\��gf��$Z��/S�NXV�
[  563.909205][T22206] �m{_����~��tx7V�<2Yn�_n���	x)��L_�u���p}���{�L#�W�o�Z��0�鲊KT'gt����}iW#"�b�Ee�ȹ��W�u#\�" or missing value
[  563.935196][T22229] x_tables: duplicate underflow at hook 2
[  563.944244][T22228] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6800], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b42}, @mcast2}})

21:32:49 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900000e900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  563.983590][T22239] x_tables: duplicate underflow at hook 2
21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc020660b, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6c00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xe00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  564.027073][T22248] EXT4-fs (loop1): Can't read superblock on 2nd try
[  564.034384][T22249] x_tables: duplicate underflow at hook 2
21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1100], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7400], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x2, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:49 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b43}, @mcast2}})

21:32:49 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file2\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x8}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="0200000077adf7d566aded5c19000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000140)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4404}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
r1 = pidfd_open(0x0, 0x0)
fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x8, 0x2)
fdatasync(r0)
creat(&(0x7f00000000c0)='./file1\x00', 0x0)

21:32:49 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000410900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1200], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  564.111106][T22244] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  564.120683][T22269] x_tables: duplicate underflow at hook 2
[  564.137761][T22271] EXT4-fs (loop1): Can't read superblock on 2nd try
[  564.147697][T22244] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7a00], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1401], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  564.162546][T22277] EXT4-fs (loop2): re-mounted. Opts: (null)
[  564.189231][T22282] x_tables: duplicate underflow at hook 2
21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xa004], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x3, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  564.225402][T22289] EXT4-fs (loop1): Can't read superblock on 2nd try
[  564.245941][T22299] x_tables: duplicate underflow at hook 2
21:32:49 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x10000}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
creat(&(0x7f0000000040)='./file0\x00', 0x0)

21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xc005], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2500], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b44}, @mcast2}})

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x4, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  564.269776][T22298] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  564.282709][T22289] EXT4-fs (loop1): Can't read superblock on 2nd try
[  564.288993][T22305] x_tables: duplicate underflow at hook 2
21:32:49 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019002010900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x5, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3401], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xf801], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x6, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  564.387923][T22320] x_tables: duplicate underflow at hook 2
[  564.398722][T22327] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:49 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
chdir(&(0x7f00000000c0)='./file0\x00')
mkdir(&(0x7f0000000040)='./file0\x00', 0x100)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
unlink(&(0x7f0000000080)='./file0\x00')

21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x1000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x7, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:49 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b45}, @mcast2}})

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000011900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  564.488978][T22332] EXT4-fs (loop2): unsupported descriptor size 0
[  564.499457][T22327] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x2000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4001], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x8, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:49 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x9, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:49 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b46}, @mcast2}})

[  564.539079][T22332] EXT4-fs (loop2): unsupported descriptor size 0
21:32:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x3000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  564.627427][T22366] EXT4-fs (loop1): Can't read superblock on 2nd try
[  564.661551][T22366] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:50 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x4000, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
chdir(&(0x7f0000000040)='./file1\x00')
fdatasync(r0)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xa, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4800], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000012900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:50 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b47}, @mcast2}})

[  564.678503][T22379] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x5000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4c00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xb, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  564.740339][T22379] EXT4-fs error (device loop2): __ext4_new_inode:930: comm syz-executor.2: reserved inode found cleared - inode=1
21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xc, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xd, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  564.804991][T22395] EXT4-fs (loop1): Can't read superblock on 2nd try
[  564.813713][T22403] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks)
[  564.905065][T22403] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks)
[  564.915697][T22395] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:50 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x80, 0x3, 0x3, 0x201, 0x0, 0x0, {0x1, 0x0, 0x9}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x5}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x7}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x1}}, @NFQA_MARK={0x8}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x10001}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x87}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0xc1e}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xc3de}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x11b}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x7}}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x800)
creat(&(0x7f0000000040)='./file0\x00', 0xb0)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xe, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b48}, @mcast2}})

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x5803], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900001f900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x8000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x5a01], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x10, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x9000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000020900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x11, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  565.032003][T22437] EXT4-fs (loop1): Can't read superblock on 2nd try
[  565.055761][T22435] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  565.079404][T22437] EXT4-fs (loop1): Can't read superblock on 2nd try
[  565.083758][T22435] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xa000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b49}, @mcast2}})

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x12, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_buf(r1, 0x6, 0x17, &(0x7f0000000040)="08c63a89", 0x4)
fdatasync(r0)
setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000080)=0x9, 0x4)
r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000040))
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000380)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000280)="b955e1cc97a14dd3f4ec3e0a86c8478adb0fd355064e2a38c933fa4ea648ef6ba55925e0b166718d2787a4559efe64bf89798c3d61be3b9aafd0a04540f66dd93233e51eb0ca0c8a73231b51a9d2f953bf4752fc525605f7fe6c2c36f7f739bd4ecd0e84cacd4b3b54461c849c45e0161c686fbda494328ac1ecbdbaca7bc82de7e7697aad353d813411201f67a367f8ef894ed3e3ae2a3cc6448e2e92c4c92a24beb8a24778ce18ce9f20427b65e30fbf59a2a03f3e41eb37db0078b154389d90ffa741a07283d25b5c06138a4850f696be99822bef", 0xd6, r2}, 0x68)

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xb000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x25, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6502], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x29, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  565.170073][T22435] EXT4-fs (loop2): re-mounted. Opts: (null)
[  565.189164][T22463] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:50 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001020900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x2f, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xc000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6800], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4a}, @mcast2}})

[  565.311073][T22463] EXT4-fs (loop1): Can't read superblock on 2nd try
[  565.323381][T22475] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
21:32:50 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000380)="00000000000000000000000082e36724c6f34caa846e000000000000007e3f6ce11f46afdc28cde57899a71c5f0d4a82597b360d421eb35e790954bf0621e842c6be605430dce8871edd6e589bba4bd5daac753164f13a5a18428f74564018529f006c12aadc4238c57c845e1c94a90c1be5086f126de16671b8015b1c14cbad0bb3f68e87d6065332397126bab495101ff14a04437e", 0x96, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xfff}, {&(0x7f0000000280)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080c55b3c3cd9ffe22f934de62bb990f803d19c7436d7dd6795fc05c22e3ffd8c887b08cd763ec0c3aae657c6f7479aa0f6fdb99e3ef2e57de17ce13b206e6ea9fdaebba9aba37213d1aa357c06cb7579c8e2eba0e66e925d198df543efcfae8bcdda4c3437a41914f80a1f017de72b786357dc37d5733c50e1f0132c8569fa1bd9d578a6976965eb4f06d205af3d652d8e911a7b15539d9de423839753228ad2227a2f842de1e45fabcbf653d7fd9f749953ddb17233a4e49d06d388944f6ded54b4d021d04caddbc61cef0592ee33d7", 0xec, 0x4400}, {&(0x7f0000000540)="2be7744bcff3884e7577f47859cd3d250ce127ec23ecb4a6025e14e4ad2640d7dbc53165499c24160e1bf1d8f38c55ce93b5bc38b0437c6161517c84f5dc8806a4b9a0f535a36e939fb5f72dbcb02f69c7481ead3fe9b2a5d23e7c67beb84409784351bfdb52e1789248c3a2ef7ddfbbd7b201815a253a58de79f0e953cd3154817ff45aeeb4031dde9f0b61867b39e735fd3639d3d555b14bae4a551907be7153a75094faadecbf5c9570547221060881d4e1bea92cd526a60fd6006938f6ef25fe17dd129518ded09a26f31418205e6c2ce655f4e06fa6576b85b9afdf49ddde73d0489948177269c468d10e33cb61", 0xf0, 0x5}], 0x20c8001, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file0\x00')
fdatasync(r0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x800, 0x4, &(0x7f0000000800)=[{&(0x7f0000000440)="a4ce5f0c2314ac5cc29f57d1e449ef97db9bc6a3f08c87e4d3c39372c461f1ce4a11233872a451212b10c3b7d53adc5eba0a2dad8d951c9c23a620080ba19cbc5bfd20d9c5d157a77682988dbdb010adb6ab2b59b47d428528cf7e0ef936ecb79e1e3e48bdf0319c7bbb754761d9af60d9b9997ffa71b59daad620cf1798a830da1e71dc2839dffeb7436ebb8e9324f3fe6fc1c9dcc4ee84a32c7e435a69017bf10a8d4fe6e8d389e519ecfe62d04545c7b93a62fe576a4242522162a3b8e762f49812", 0xc3, 0x9}, {&(0x7f0000000640)="d0b4faa4a4280b89cb52ffb52f83c8263e10b3e9f4c6f11e22119c491f3a8922f2b0757575278adac990cc9a7f2aabe51fc8fc85776c16b9bf2a93db04fc76614465ed967b42c400ea73d8d020605351272dd8387c280802557b3800ab782fd80711f02acb5f5bd01b05d728fbbd406e20b3e3bcaf282ead927c23048995f6f1e44514edc989df47b2c6dc24e53c559cc36f6883e175f652cf4167d06f1a78b4254ca2aef32467e29b9faa0f6cb69258447bec1b79a4957d282c1eaf69e35a", 0xbf, 0x5}, {&(0x7f0000000700)="70c4d016ae67b546bc6f887834d2e4e4cf5051395c24879074200c391a0c6a83d51744e52d60d9bddcb24b4180e1c59f337bbc58419e62cbc8bd8c0998a0ef2136c9edc3df7c69b6d94c7e4208a2f53923b9758aae", 0x55, 0x3}, {&(0x7f0000000780)="9188cab36f1df449b8ac1f1fa3c218e1d6748c523920f3a86066c0723fc4057e35296ccc60f6296682ff61beab56aa22446066c4dc0c175ddc9d39f16f861c8804c0bb42af5f53", 0x47, 0xd879}], 0x904000, &(0x7f0000000880)={[{@uni_xlate}, {@shortname_winnt}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}, {@shortname_winnt}, {@rodir}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r2}}]})

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xd000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6c00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x3a, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xe000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000022900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7100], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4b}, @mcast2}})

[  565.366269][T22475] EXT4-fs (loop2): re-mounted. Opts: (null)
[  565.392862][T22501] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x48, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7400], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x10000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
creat(&(0x7f0000000040)='./file0\x00', 0x40)
fdatasync(r0)

21:32:50 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4c}, @mcast2}})

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x11000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x4a, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7a00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x4c, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  565.504618][T22525] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:50 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000025900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x60, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x12000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7f01], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x20000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x68, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  565.590811][T22525] EXT4-fs (loop1): Can't read superblock on 2nd try
[  565.625281][T22551] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
21:32:50 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
sendmmsg(r1, &(0x7f000000a300)=[{{&(0x7f0000000040)=@sco={0x1f, @none}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000280)="80c609e48ed1f7c337817c22f423b8cdc7a6206e02f0b9bb22fe79f29cca8af30c4aea26f2ecad4df6f4fd04ce3c5f2dd7d1b0ea883b6cc21a3aadff23a31b72bbf9c9c50fc1ffb6f423bbf2990c88ea5365c898e8317f6221c9ecd45f7488e1833052a1b7ce018c83d787704a8c953ec92ebc1d04d68688c8ab736666395e012bbbd8a36ee285a9b792d481d81f8e0161741da515d53cf6f16f2135803ba03be3a6530b8b32b56a3e1313f9f3f982dd", 0xb0}, {&(0x7f0000000340)="5ad0b45cbab6135b991be87c4b7a0a807a47f5b415b9da0951f973ecd56e9fb522ba397d0664a6492f3e3aafe419b3bd4f8dd114879dd53f6c5a7edb2d2b4249b22309005593dc400f", 0x49}, {&(0x7f00000003c0)="79cef3ecef23f1479ed2ed683a3494dd51e3de1bc93f151a16e6f6c622a6e41c8d6664b18bac0aa692c865ab8e8b5d6285a0230fdb8b4689957688f6508e4aa137cf18bbb6ef77f0236d94e22f3e35dab39aa9ed92b1f45d5eadb5c1d778d1ff3f1498195959a9aece39872735f6c1d3f155c1213c9ff5534b0d8a150bdd402e13d7cb14316ab1b0213ea093bd9477c640", 0x91}, {&(0x7f0000000480)="e17f8c179cc1f9216568e0d510e87e6120c7af96cd6feee53717f5b15b27717a833fc8cf8d38d73c40603d87202f5ec9a8de7fe44b3c9ad9c4531185d5252c2436cd31d528fad9332eabf8d2e2d2115235cf382d4e32d793d3074c00bf137a9c7a2674514eabff621d9299613b8ef4ef6a6226cc891ef5c539e5c339b414716324e852d52fdc5b", 0x87}, {&(0x7f0000000540)="2d32bca08215fa70b407731f601f3679e823aafaac81046d463b634f970a9166fcad6b022def4daa73ee29f9d73bb3a38a94c7af9ce823fe5571b6440517c7f1a9e55b79a48e7b63a9b895df2ad8b6fa309fc6e535061b4a1365d1ccb379c4ff80b4e03b40e714294c424a400a8ee3473c6e05e487b69c6dd774", 0x7a}, {&(0x7f00000005c0)="a0b660b0ea8239384297a37e430cc07cecba72f0cb2976b11749514612b7965cc244ab9fd7348c7a13325140545365c04786cdf67b514eeb7ccd7f6407adf7b00040fdb212b191fdd0921953db8cbace5a0b4e3afa3456efb6680a0b2f1ebd540d130ea888e466678528acdbdf8f61bef9551715778112d84fc01ebee0839d7a8ee122610fb4be94ecab199c678f0ae5aca6956603a05b55a4cf34eeba6c1a68905d7028cd3c5db7fb0fd682cdd8398f0365104129d9ad4be01257aac981063ae6a518350463ba9c8b0c1546f344a4ad404c5ccefbc83a956ecd917dc09e8ba64c7e9b16be062b97c0b226f0", 0xec}], 0x6, &(0x7f0000000740)=[{0x70, 0x10b, 0x81, "b2e1b9d2365b1d2de8743d1da03da5145dfae15f3e1bdeec3b64842b26cbf48c01ddf0c18253648c7130dfc18f0a71f300144b3fbe91b9057e912cf5adb7b227a58c61dd7acc25c6fb09531c631de67e2f86464d8b6e95b8c4f3"}, {0x1010, 0x111, 0x2, "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"}, {0x1010, 0x4, 0x8, "afafb42a3d40f2a3f0b545051f9f4e71c87dd5a814102c959db5c17347a3ab861dd8d8db15255eaef6cae36f6e0939cf612aa27ed3cb3795e535c8f4ca4f523e2f93db72b394bff9e7280a0e645623c7921d49c8c32184373bfc1343d9934d8f8a84c1a5089805555bd426ae4fd4121d949fb4b2b4e32bbc1f75ad48551be80b996b6666210ddc046bac1351549a7d97fa500e0f8006bde7b60d5545f064905e6ffc62a1ffa46460a92430434bca055c1d0e22df38f3aa0ec2ad75e1fed69343df46b1f71286bd6ed1c64f0fffa1b916e268575be202d73867f2d4ab5833b4779cc4f0bb4138bf73b78540e8300dc2c643b614c1d1a572f51e28a243698031cddce86997dc653cf7b573234c65af8b12946cd5584683ae43892bd24fdb817cf26441c0a6d087c3ff6a8aaead22e5efa93c68d41267ced645e361907f059e0e9713e9ac210e72ea21321279b2f6c1155b3d5358c42a3b0dbc05e01c2d748ee42c6474d6c90a611c3a1693c120a92b9d756523772ee57409c966a4a0e879d969b4f6b5bd7ccf040f36db90c24b79e5ca68a57751d9c434bc5d58b1d52a15eea63d60db2fb89c97cecab6f7e5da2a0ca129b9db7468c77e41caab8d95a8ddb39b1cb97799b830c9415c504280cb912e7e1cee4bff3099d1efd6cf8b753f76f39786f3ec10602ece1d1b26e368bad4f2dd300848d45b9f1fa24b4499bcc3e90a22145db5696fbcda37fb3fe726e2cc40b963ecfbf465b5f142e4ab6dbaf85c5fbf317d4d8e32e6828020344e1efd97af3a9c4a9fba2a551c60cfd371f5179fd4b84d1b6747e4bfd902ab30b1eda84300797b11bd32381b8c8965d2e27b1ab72abac40af27d96041ddffd714be63bccc200ada9391deada37f7baf0d70608c454b2ba4e3dff8c544422009449140ff1b2a9cadf98339148079af46ba4858c9bcc24fafc81e9046e832ea48663bf3a8139b5385aa9a4f3da20ce0ac7c93abe6e789b2bad7b817d00cdd39d9ed13be57df0d030bb6e294d9b5b8561d1fd8ad6e77a3a188754b2203e76d55b82e2dccad9f38b91d602fb9067ecb6d3297b28581f65514d2d6bead4ff04804b6f74dd078eee6740228094a16367e8f9a9b5c825b9608398aa9ef307eb736014aafa7db99a1675a29ad4a87035bebae71209f976304b26d7613b5bfb63158f1755135a2625619afc032f29198932cf20d3d3f5562975ce56647a550f9e58843ed8f62fe0c9433d4f31df4ac319b3606829449ac1bd49b564ee6ae0ed729d3661459e8528eeb3feee222350665b2a89066224c81aad004abcb48cb941043228cc07e4577b4eb127624d544513407b403484a29034c966651aad3173ae54f75be59d89eae4ea0ced014f25aa66f20a9739413fbab4bfe6a5c6e579eaf952aa9161f2944803bcb1e2df8fd82e7655fad32e0c580df2b88031ec6c06bb972735b76ccb0e565364c18e0b28a2d3b25241ce2bd8051dbbba290b21b7bc38c56aa4c3383b2a805a53377c72e4a9ce8dd8db492fa02039f3ad319c698eaa35d73f52d9e0ca7bc4cd690e7c2f203696fa1b0560d4b111d743314776f8b16d9ee6f3c02e0f07f9b6c197e2d8ba5159e00a01e03d2fab93ef8c408975ba9cbf12314699d395b748413170f8e6ff03a8943609d36c09d33ab624fda70019566a0710405dd5bab750cd0c1b277b5b7ae7c4d5ce8d97fbaf82fe0ea509753254cbeb4a301f79b2806ade5df7c9130e53cb1b4de54bb14bbda391ae399cc73c3f4eb1feab140b2c83564eac6768b1845e190a3200ec9ffd067721e4d0e1acde6178dd9cf9839e5a91cc928e2b6eb98c9511f996b7f63f7e3605cdc5cc00ed3b86aa20d48026de6cfd14ea9aab8b5ac78fe10ad420f0069536c60167d48e4f04c796c90c03ae36cb127cea13e738c2736b893a9cc3f626035cf3d3e332bb5caa9a0a0a96fe9b50cf498e18653298879978460e014ddcbad7c4d01f6f211b7a82584560cb7d62f5e72a294c89a2b52b0f8f453048ef0181e69eb0bf727d97cf473a5ea4f84b99eac11d2d60db8598a40448808491420f7ea98dada6f681e97de0d6cff6632e52cc6ff2de63c852e258a7129f8f04fd9187a2f61a2c9ca7ac2d017933b88eeb1cadf6ea42cc8061378aea5f8fb50d29341b6e514b71fcacb1246610185b0f6429b9a6e15df37095f743f933a68c1d183ab823fc22005bf4918866bd09bf4e8d12dcdd0721eab7d1ba013c60301012de176020acb7c9a98150513f4079da5c7fb251f82a7ecabd19b76ededcf50c1e07d7dc43241f6fa39319242f79272162d27b63f112b24738a5c0c6854c6dbc5dd7cdc629d5664ad38f3db93f55b10b79a61115f601452a72a79e8d5f2b27d239a7c6919508641cfaba3f1ebabac41c709ac9e14b61627d2981f9c6ef7ed159bffdab6e9cd2f4709122fb905571e7667752711f86a2446e3ed859a4cf39b6d9f7446b827802e16aa352c79df56724d1d59ed1263eeb384c9c948dac31aa0e6ac26157268031a166ca286251e15467a0f56bffefd2be1e588c23280d9e4dd5ee299cfb256929e06c98790a2a98c51ef0bd3c92ec388edb80f72407a0dc32d957a59a3f5e998199cf235398f6408b122fbb26ea44e377fa63301232d4b0594babdb491faf58704b629a9ec596cf57ba9206a2a6316e0fb6ae9b114ca6ba4173bdd85912f999f7df77133892fc4d2f6c423c84b639c33dbf00f55ee90549205f862c69ada64bbc02adff01f7a254f6f533d5e7de92a412f27704337db38a43f561e066c1cc3e3f3546b0e4dda360fa8867585b4e7bb72beb5aa32aaa94099b80e9b3540d48e456c2b4905a53dcfd149a8257593953aca14f6b0d587ed72d3a976cc1d620b8c5efaaaac93364d5e68f4e06b55c4c1943ae927cec62cc679961d8f8e305e9a87d806514d976a108e46e43381c7b696b17488ca9be7bd2b23c375423ee4ec435e253bb7727a452091910ea6842c2473649db4e1a315bde8255d0401f59f04258952fe8f610e23699e5c9b45a100402c691b563bbf792e2bfca75e3d7ab405bc92e901012a22c99b363c400c14beb35ef01bae19748cd3ace5d7e407f2154e4d6e57b07698246b02945c2fbbc05debba5d0c987c0c6b66fd67f4a02133aacc421b7c381950a1d58ad2cb26558335bc9b2dff0866eec71ab63f0ceb6e63e252277501d75bfe9e1e4eaeabaa7f98fc469034a2981345b2fe7b30824e6d3291eebce5b10be4a264d773892f15707078bb86c1a286dd32cc2fa5453b8e90e0460cae9ec381f249fe8f221d981c8504b5424704bc1efa3ed331a70429a473b7c88fee16ef9b230fb8619c71961092ac2bf7503201a9f570bb55083b3277aadca9ae8c868ea42184293acc0d7bd71358a58df1416b387751a39f0d5e6bab7def70c296cef7221fc3502bc7a85e966a1143d2c935809100737aacd76e53d1ba65b8b49ce709b8a05ebe1c47b5a70aefca60b98c74de0df377bb51b6082916ed605258e13161c2c215f8c4c3e2d39dc09b6e1de32316d711ca757c313ee9f6f3db1455563aabe6799a77e6ef8925d10f36af45ee6b50f1e6b1dd2e62d0a4a41d3633c6bb4c04dd6803553d13ca9fd58bcba07b18fe14e88c27da400027c8753376dc958f6ab506f1db70a665a4edc1f416a52db8114d892c24f4a7dfbbd596a7ba4589c08c70d757ffd40101885dc1d9f95b5dbaa82be65c0897a5d4602b1cdca00e2773af2cbc5698b708a3713022d2f0916b42c76fb662e7a0efb4622b0b5543b74015d957bc861ebbc42d4432af3d45a607841b47c1be07808b5f8b1d90c55f0d9720fe7138038ab89b3e686d0a65e69a2c193aabfb5bb60ca641a4c9a9007ece8632ef636d7f01ab24e002a37ec7fdb08eb20c979d724b3414c16b41111884a11aa0cc341801449410a27d7ef60bb29e735571e8b56b067e14ccb77d3dc31474ecb4461bc79a0b1cefc2cf0060646b21ee23b7e470d9d36a5295187ac1193697f29685363e492dfd6522cb4e1df8693377b37e732be5b8f636d562905c25e668cca2c9f8a977ca3333467b66553fa400e5be7324842d1afe5f3183c6baf47be818436bb40098b0d01b2ef3859b8d556b94e9263609ef22b86c4deeffc113290d4ffa064951f06166d30d4c7ea0101a85fe44d1e841fb594062d846f8b666f5c5841e63b67ad176691cfce59bb03cf1465dc932a866b8cedfb0c660e007d70f9516b2a7decd7f84f0c8a3cd7bdd01a60ccfd7ae17eacf2290b8734bbe215e38b0574db92ea760d2770bbd1ff1ab226c576a50316d349b7be16b7f065f396bc4673b6a6f2a89042922b5da63b25cf823de016192541f4f455cc2e7ebd5edd0b6b4132f957ab686d2a83e3578b64b5c87447b15ad6c4808be9a3e940cc241f91cce89a25f64fcb65d9fd5b00b33af82d53c5727f3bbef5b54f8a613fb1f738b737abc31c3409c9782481229c1695286a4f6f116684430286300d032e778b90269eaeb0fae2d27e56fc91e112ba0e3d7b846c561478f7576e509369ee2e3265a5594568ab5a94041cf5a41eb2618c2bfc253703c4a5a1273691c4d7d17f278604b28ca0cf5ef0eff7fc78331f693c308786ad7de125e41b52064b53adec8d120b8f612992f6a9df98ae6ce0cb5faeb66f4303472857aecbee15dc686daa0c6fa3ff38868c17960cf54171fd3dc00b52ff5f08066065a764f00cf745a941cb2cbb6aa10e0d50fc310fa7a3cd59b5a9deb8135761fb732fd01cae769a97699decffd91f53749c56d9c9ccf4cac1302de048780240b8b14c00334726c9d3d3906c407c1e0ad43bb55ea6834bb65145b73eebd519e6416342a6001d4ed2a949272891e978d764c968d6e25d823ab8105712245d1ae5972ca02d0db96ae80a187d6ca4074e98f59e0f74fba284fb2053822ca5b4b52d9af49d66b302e9bd5b1e10d3e97daa6ebf04ae2d353744b4102b38fddcbe011e0330fce21b7dc156221c7a6ec05b864ee27644ea31bf37201a97ed8ebb6a73ae4816155f739fdbf04f57c51e13c885ea828f04c6327fe5abc228aedb8408dccbb0138323f9f14dd80b3e3d7b4b51ca32834c3d9fb4fd97331d6711e68d88671bf08bfcee5a1a2ed8883bcb8d69bd8732f4e6e93df78c6a4799b21cc3b1767f236a48e50e97e083e52fb4c7e926bb2ea83261428f935fa4cd05f8a212a92192372f1530a9b473b2ca73b022c3aa2d08123eedccafd08300a55d0dfef09dd89bd3ad2949f3c08546c307dd30e8df0df840dbe7f806070b156a9c4511abbf697aced4b394c5c38503c3ad188c39635077d161a3bd158b342486d3f1467b22588e10f20207355d433b732b9bbb5e9b8b6efb00d5ae53dfad5fd4113059f5f22cb19bc6d9ceb33bc528264e4cfd93e701d31f09dc1a325518bd8e52dc82c1434bcb499024b73b58f657b72ae9afb38e11a9ac2aa1037b2071246d41476ec502f9cfab5768688fa6ff504420aa791d76efb2fa129a6b949dc7fafa3737f23bd06d05af89a3b1d753d4f5d7f2a622bfc2eafd0c3a0054db4f09ddc1a53b07c7482ec28f0ed9c5329b8aa54e0ed1255e7d4b30a0882c463f5158400b7f1d8edbd6018e03856dbde85e471d980efbf9fec9bc2c0f6f040212c0b55008f335bd7861e14db0f128e72b4d2dd4e83e2cb15227de734e0a89123a480e3b55096556780f7d37b934a44abd33d907cecffb19d8649b2ff3d95bd9ea92df7df48482aee0bcb5700627a103bc0c499569ec8e9dfefd41c5a73ad64dca56c0c1487ad0"}], 0x2090}}, {{&(0x7f0000002800)=@caif, 0x80, &(0x7f0000003980)=[{&(0x7f0000002880)="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", 0x1000}, {&(0x7f0000003880)="462382fe701d43ac01862a8f4ea815aefb60b87cfc00aa0c2b992d2d2214f0ba7106f32d5546b4c6eb0641cef63088b2e9a2b1f84377a5c0e85a98eb60060ee00cae27531801f37699af60823e13cdd1b8ee566311f9fdb0d086ff4cd4cf97f877de915006f68a2fec664522ed06531f35be5cadd434e41d387c6cb4d69159cb78d312cb7ac5ac9a74ac49a1dfcbe5cac0618e945b8d07c576010e6c59c2b4dd9c75bcc15555fe16ef3ed40110e8c938257f9b69388bb5c1cae6eb6b73fad728d6260db28f1fa446933ffd9ae7dafd963f6b2a82874b1b4803fc56b17b94922742b2dba6e9f421c4", 0xe8}, {&(0x7f00000000c0)="649f6c1bc6f066b925d167b68bb0fdf92613b1b8d09818b3ce5f396f79125a4b2e682186aa5b07da0473", 0x2a}, {&(0x7f0000000140)="1f54bfbf9d2f079683e8975f8e89b89332660a4ba055467e91317c50f700b0", 0x1f}], 0x4, &(0x7f00000039c0)=[{0xf0, 0x103, 0x9, "9493aabaee1351a4379a84d17cc1cf577fbffd6096059847a5b092b77e2a652660fd3eba3a239f6a620d7c5979ca21ce17bcc266498fea807339591dbe5685ea9221489ce7f5e82f2517d599cbebb7b4ea9cbfa1bd7be36483ffda58a876f4595d2a4e584756721cb2a28a133e5db1aad69c0a5191aadfcf3433583d9131d8f3b0ed0966f0efeaa082ef422355915fb547a6a871a20163eb6683a7dc1193c535dd923c77dc991b83f0d0412ab9c09faa2c79c3fd9f0266fa26714ba111248d754471ceebe6e3ee72f984d5d623845f62d5089b02f8d5e9faf65e8ea72451"}, {0xa8, 0x10e, 0x1ff, "a9cec32ce25a519311403b1c0fd0fb997b89543925739468b40c91ff4d15bd564de6c9db796553aaf26cbf95ff7e548b82caf4febf3f74c36cfee6c095e6f0bb5f8d1736a662270b0969536850c27e52c8ed606df77614cb82ad6c8b5ee1b1fbeb43c0704ec96237e131f77fe0483633f8e148f33fcfb6de1358501efe227850d09346ffd905535bdb1fde47a246eb499a01f2d0adb7a0"}, {0x1010, 0x10d, 0x200, "eedeac27950a42e25da4c031dcbbbaf6675cd97af3401d1deba342b64c4e673da02820c3e558b278ea057445a4adde9f7681f5ff2a8fb23c740477e3efa97020ad8ec501f93298d2d14e616cd0adabfc3136ee817a4f2f41f570d0d5f4f4cd134ed3113c9678ff0cacd92d53dcbfeb819fd3cb4f73585e696681af3d175f6bf00e5ef6da4af465098b2560c67626e6fe7caad89fc32305c70ac3689fda36ded2cf033220c8e28b52a6803215f751e375af9535ebe09f3bcf5eb3f118c5d15a1edcbdef76c54d56c8bd63c4bbcbd2d98a934ee35c0cf2cf44482418e2ba0574a2174abe8fb33eaa5ee865a3d30a074ebdac253a02911515427eb2045467a214cb139ec57463c71587a25740052fa511e382d970ce7032f237cb8dc9d8067686a6ae1c47763994fe990150264191a4f6de32f9854a123d9f09ea07b717d0b8ec3b502058910a7b215d1b4338aa3b2c3ba2f9a13fb30b602387bc71d150aff4023d5ce67e942aecf130a4e0d7547cd00661d884b1a4780d5598272fc9fe940679ab2049ff451371f760d060a72189b871907d84a367a936db48f8fd1fe59c4c4a6a5dde7fe13ac51cdab004bac72e825a2f5cc07e631cd938b30465cacabec61510580ae7c9fc20db57df2faf8a934f2593444f51582ad1df5616d2211a09b19bb503f9a28d4f79b16544c678a36585fa736257bf81fbb2256af3ce565e32981e85640e4d460bfb697d934130571d550282c389b391f61034a0e583083cf1726581314b3ba8afa129711713c3fdd0e8be7ae57dd3268a91e41c9723c8761124ebf5b8374de125311ce7ab31f301b1d2aabce908c1ba5e0133f82be719bffdc9292a80a6c9d5bd4d43802c7da3ae0c6aeb6999366071d54709ddd3e79723a2e40ea68af84896fc2b863f9d9c756eac73a6ef2d15492ad5c6ad6c65474397cbf9d91f1f43859c9a4108ac975969f09247487ca14c60fa306906124b80daaebcfc95a9026efd15db1be5e48c32b8a789aa47b4e424595a215b8a41d88f6dc6eaff3f34f23a2a9c4c90db6a7c76999741efaf175fdc9866b15440bc28ac6653da4358ca77957787648704cbeb26e44db0160ecd1a99fa2de547cbc8318459f6287774df3fb3ff78de4cd9f104a93ed30ecbfcf8d015a8489b7fe671962ff57e02458bd6c4a30c876434f0cd823af6d37d60e1981bf33adef63b739b99b0865ba4c69ebd5bae7c24827488d5506bed49650fadab03f1743907b0840e0ef555aa2492109986e0ad9a06d3e00b2df92828c899c240a010435ad49c34714755b3452698aef70f86a753a6f623c9b09df17fc3079bd3c05ff691fcbdc9c51e69aa19e59485a56220e08ae62199abf323d4567fc35e6e2db313752331b40d1456304cae025667fee3696dcb19bc5aa180b1f67f5c90bcb895a2d3d227d9d3679b5c35e38b5a0df6dfbdd22bce2ff0c1e27494d53472b48bf5f893619d3a0930b6f1a313c52666d70263f74ec09eabf7e00fed454e0bb82e910b2a4abea3efc326c44785a981fff173a2f8c24ce52a380ed35a04fcb8ee2d832507398a9fe39cd899296b9ce546a6693946da5fb807dcca08a4b1a74861460f3f7334b6156d5858a7dfbbca91dff63f9a24db31219c21d1f32592e30cf5175a07372cebef772ff66f3a4db48f7a78edf1688bf084e0a33a576518d15598ffd0400554d9ef4eb1c95cef48ed311c798934b4de3f3ef542c117b683d1fe1edbc391b5d1f0ff6d928b46773a8d69e866754a0fa1a97051aa8ac4ddc055f1837d470e3e33798521a2e5177cf0587baf003e323c15dbd4702dd18cef7d2c07fc5956daed3c32e17b719b9131916bdd7523880ad4af4682c73be85e7b4d5b790a8a315c8452d802773a65a6f9ec8482fef3592d58bb26281f665dbd053734c1e1dc8ad9544c02090dd79e61ad9e5cc62f84a50b898e3e558b0a8026493f796900e0a0961f8da627e98b36c1311c2686881446881ec00da71a17972cb6abb7c362f49f8835a4c1a2b7cb174ff56b1eb9d19923e16b6c1cb871b225caed9a2f4cab6eb2cce7a3ff8c1e902a96fb2cb68eb0477cf5c27addaf3fba9e12c2fff598350eeec33c64634d4ceb976b3c49946a85ff885d9888b2fb2d66bbb30f10fdce0af8aad01facd51bb8a75ed0eb756e4c0109249bb435564235be9465db838b2b3c0ef7cf2efadfa0f2dad8eb718402d16a1c3ae0c00fd6ded49e46f210f4efd90b2836fd2d056354961d6c350c7da3c278eef49e289e0e33a3f7ec5b25567c413b93962d007f94f990bac292a1919142b7c0995d05237cf3caf04b3337e2101051257c386c27c9478541fb243a0e66e041024397e5e02c511fc99b23077f27dfb5192071d2dc63fc6b40dcdfb15f2cb7b5d597974a8289ebdbc69f7253f2240ce755be2b1af60b00544a4b4f35898075f314a7f9a7475c0768e999ce47a27417d5c087f029798f4b0898627ece8c91d48f74a8129e6d86ff6f1edfbdfe1f568a81df06c08983782a2a24d6f501c39f7846f8e9135c1030b5bef3fec3e8bdcb074cd24a2af08e25a5f3ff1b83aec8b4a8a5c643abae6e38d5e2b4f18f6e428320ad2daef0b2b10f437160e4bd2d9e5dd7408173469ed776b5fe20e249f5616f273fbffc33d2a12330d5890e684c7ed22c4279c5d343db5405276246b20fcd998e9c0d9a87993704f76566827cc4a2c08534d93051e8b3a990836e9f76719588716b735ec8eabee2a38c857094108c0225d30e46782df8058262c9fee116e6210d933fafebe44d8b97c279284c10b0b953908d6148b9594b960ad470958faff3805594abc7864d6f46939faacaea6e29fd2c1c48a5b13721aa639fc4182a8550f3c92efcddb65f103ecb866dd4281cd92823a5c1722ca53beadc50eec390300f4ae6f9c4d1b75c9c4f46e989faf09e4c7c4ec8c70da4cd3d65609212dd83a460e9b693897f1011bc85c07a202dd803ad0820358b467965ac3caa2c14f4ce2a6c68d0ea5292f274f22e5c5cf1cebf64ad7131645ab16928e359ef69eee9ecd8aa0e3b3949f4ce227b46dfff4db836119f03aad7ed5b966f16d996ac589270b47cccae6ad75d574b073faef0a3acf41558005f5f128766f9f1869b78e096eb8dce3db9693c46f8c1f2953d255b9f73a829d8ce2d9cb50f604156870eac5f2f20c10b790dc6cd6f83a0d1d806f8aaa4f5903483992c90a7b39f8e102ec3b14a124dde164d8e1b8214348dea3f7e7678563d05c960c647603f4aeb046af8c1c74c29c17de2d0db6837a58f3428a0244d11a6035f8ef26c1813630538e0b7d19c65b6213cd5b9f186341946fdc210e06a1479ef5e5ea627ed96102ba3a0381e4d2f8d2fe826f614c9f18fd760812215b76ea3b260b9fdaea2232ab1225b20d98b8a6bf9437b8e4a408eced6580aed9cb1a1804fd47ee5f76206f75efbd08fbcfab9324c3158c7a00ca6b387397a698630ce8cbd4d22b07635cd0006609039990d643d97c05c92e4288a29c610aae12d14bdb910b77e3d7f224cc61af883d76b6d0c36c5e569b436ed1358a7bc0a8b7102efa6f5e5a95eae8119142440777d6a402c66fba8e261164e89572b1380c3d33e4c3820ed5dc5bb1488979756e920955c9964d145794caa95ebd70d642cb7087281a0ba4ede2b8a34b4ceb064a5bd2fd34091fb970a5579b9875af6a4e3aaa23fc662e23e847b6a29a8de7ce5c2db3a66ba08421e5b3c5c87fdd5dbb21174603b2657b1d4a99922ba04dc6c284e45b345c7b88aab258bb40a3f72709aab551077d706bac20b8832187ef32f696ae87140118b36e35efef5091f8cb8d91bfe68bfa7c25282bc9e4105b9e25eb44d6f38b19c375ca79fb4a3ea28fc5d63515ff8fdbbd66efc1b0efb0d0be31830fe93cd05bfcbf44a00720ba19e92a51a453b0e7c0d10e19dd3c44ba603edee53159cfc257fbb545fbd07b5f98959c214e3237180982dc65aba69c7104010f2a4f416ae600c8af18929a3bd7d071ed4bdb188943d857133fee22e5b0bd6425e1b118ce629338c19c714ac9b0dd586a6b65d50612564741495c39bfc2c58166a256795f4b48ca4782fcd9ffe7e5d35c9bb64385491a4c0d2a2e4a39c9cd1e9d946abd23cad65e8d594a485025a60941094c97392c4ecca18189d91a3c86e44ab51517df2752df942907bfc0f6731c4f1f27a4b5286b901e9958985eb8c194b2f5811394b974cd6ab7978d16833949143dfd66326a6544f9716a54e57c614d91eb8832bea8369b51aea8a664e8adce23b231d9b456f850fa0732ff8d51199fc8e76a90136c8af5a41396473d1f15a8a2669bd9bcdcab13c097610333c83fa8fba534e7d31d6bd30ee23ed9e91523907209c86212b6b1a1c4170c6a9c60943211658951df6a0744b579cb3181b6e647eff69a6838ed5cf2872c326c22db421fac61e33c8908e8b5f1df7f6daea8683842aeae83bd341ecac91d5f589b38616f58cb2dcf995edf675064bee8f388873df4e06fdb444bd4e1f36b3bf2ebab62911f8b552f846d256e862236e174b2b2265e98efbf4bdb8d71038c70be525b745adaab4cdb5b10d8efb1f45d2e60de962f5fd40cd717572effdab55139b8c6c0f01ba922589a8ee5fdefabda15a5997398573ca0d94a2c28923782573bd7ecc7d0b4ba60b8edc57fabcf2fe712501f49e52d5a97412c0de8b02ddfed8a6798ad4b83e74d8f54c6a020ee4a92bb31d648057f20bb2477aedac2c2c0931e8ac9d3552371e305426eb370f6642e2d14b649ce93c5b94a39903b055e82a60ffbf1e5c52d11406a2a90d9124882fcadcbcb70ee30eaa42a54928bc52b9d760beea2a9676291f01969cdfcbde36bb79b206baa4eab23e3a70371b5f2974e879499a0fcbd2fa5f92e3dd784a68e74a5f5b3b8f3ccfc75606b41eaa476b7d26be6a43a3428c8a5023f0a8495c504005660a6483ed0e690eed224655ce619e03e86f82ded23b3ba913091fda5bc4914fda15f5ec0020958305b74e94b977f7984e4523c7dbe4d6c548ff09d0bbccb3f4218224b0906ffdc6f25e159658e3527c845db21b40cdaae6e3c0a90db4367c55cf40d90e1c189815d7ff9ba1b9992489f78379323e9e0f76379dcae3a3c616b66f80728880717655ba75c3acfad783963ab8e3e4602a5fe55dcb6c495ef28e4d9e32f119a983bc8eb0d36d5b499a9a98620760b646c8375d27747b0758aa75a676f2102431b713b0412d02b6fc0c4efd643fbc49dcbb43485b3111ab66b7c5280195b8fe8dca3ba1e321b9ada0bc2b0d0d8d105d8903eefb1e9642a90a64627400a8f1c7286d77728bf63195f6ee25358e1a907a7879c04507820f3dcbd4ac8c9220f8f6be2042395d58c76ef99177517e94cc1efef9d5e87c4c8aa47d1b9a65af9970462cc473d1b905b7e1e0f493bfda473a6a5e3b23cb7ba36ba39178292462914714103e0e78585833980a5f8b8ff15bade80fd6aabd9f80edfa80b457c5e4501ab3b7b2691c0ad95f54061ceb8974ee4cf093cc1881e496ccbd68edd6f4bb3cad823636d4d4f71ea9f74b3bf067f318bcc6d2e8f79584fd3d6f692e44c64b806ce00d39d4e9a4a161283384b3a78f228f467769d64304681939c6634f31cfb0a358321817d8ebf435c2004ee22627c1b414515fdf41448c2f4bd128ecf6eac9441e4198ad30a168befefcc43cc232ead3883e528d790927d6fc742daa9fe894d535652bb7fbb63f9d6f663fbd26d62d2fc3c9b880d51d3bd012d6e1dcd7adba2409eec650dc9c9af7d10ffa4158"}, {0x1010, 0x10d, 0xffffffff, "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"}, {0x1010, 0x101, 0x3, "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"}, {0x18, 0x10b, 0x2, "e3"}, {0xd0, 0x10c, 0x9, "cd1a2b6cba44e864abcaa1863713c89a969f79e9f9b90ab359ba874c47663ee83a8131613d0ac90d1b29e4249ae5cdbbc362f1a1d39aeee776f467793d3433b4e0c26e306f023006770a1ff460bf502df8cd6ebdf4c4282ea613d8d29b262a054610e685b40b934e968c227e7a6ead6f24f28978c07c51e750d56d460bcdba9c7a23a1d842ffc24ff15597de3ded2047ba4397da5597a09ee924f0f5579408ce123583de6866b6cb38a029a96e66369d44a58f8f0df272fb7e82c27b8ddb1c"}], 0x32b0}}, {{0x0, 0x0, &(0x7f0000006d40)=[{&(0x7f0000006c80)="647b0e91f8ab357f19642e61414b544f5425c8596498eafb23aac48b8f0645435ac6a4f7c5de4f5fa6fbb3519643ac4126328aaebc60cdf98ea5190683274ea007efd0516575da6681cb338774cfc542af8b1d3c69ce3943aeb4c3068c248c7a6f0248bceda4efce6b69bf222de5c63bebfba9a1c489c3eb08a92f3d457f3fadee", 0x81}], 0x1, &(0x7f0000006d80)=[{0xb8, 0x10a, 0x4, "bf115e23f13d50211775e130c5fa7b00c8091e7e82458e47b67f961569768a051be7c3fcefb579f3b462acdfe7cdd66084cebf159f532df0db5eedc8feb5dd72744f07ebe976e77a4dd00ce1089d2beda2df6641c72febf139cbabe198030dfde605add727134d70c0ce2b6fa878cbbdb0358fbbeb4a46214af584a1c986826ed0b8c3b04a1fbd0aeff461ba9b9ded76f663695c028ffe56dded90c2ff5a038558ca11a1b5a55e"}, {0x50, 0x88, 0x67, "15a64398291fbf2b02fe9af01844238a49de7c37a6627825c56f5361a84d8d17730dc772f4da368b9125b0e3206fbc4d4b5f67215bac157a9cbf0f6e308f91"}, {0x50, 0x102, 0x5000000, "70cd338234d3ff119a6104fac3cebbdfd6592b3d7bc6657365f98213d2d83dcddb8e1dbd7e50eba7ec4226b0d01819999d8d993068a34abe7734"}, {0xa8, 0x109, 0x3, "a1a9c1230ee2767f0d63f395dbda0d2139dad50be8e2670895e8da07be8d60f5b127a8ea93b1f299fb6db436cbea2e7c9b949a02447e2d87760bc1b78c2c18b0211bed275ab1d07b13a2a0b69c47dc14a974de35c7cb8e040846277ff3ae72f65ed434dee2edbf81dcd955ce0716c0733fdce70d928e02633a93280514b6fbdbfd5b95a88299a99f99dad7276d267bdd5327"}], 0x200}}, {{&(0x7f0000006f80)=@rc={0x1f, @any, 0x3f}, 0x80, &(0x7f00000073c0)=[{&(0x7f0000007000)="b5b62963c982f242254670bb52102eee55531a72b5c4580544a691cf9a", 0x1d}, {&(0x7f0000007040)="e0d983488812916d1d0c14d74effb5bb48cfd6dd118f18ff3789181a07e00182538a00e068845c8ec5e1bca9fa867da17dd06e272e225a72dca35c8895435fa6e8cafd2523dc1792a7d065cba1177787d768e3204099704ab314ad51bc3de73456d5d3f200e58bda7622", 0x6a}, {&(0x7f00000070c0)="755f27b2ad067a74ef89b0e6a7ea2e970e64686afb87133d4226ca38b193eb1ae0afd7", 0x23}, {&(0x7f0000007100)="aab8bb6489891a046d53be1d469fccd7a732cfcb373219b9be59548e62e232c4e89b96a8f027c68ed6422f1cb8a8a4bec81dbd4e84da4950093b9ca483dd04793b5d59e9b898e11661873579f11427961960ffb56fcbc93e4a80c1e0ab213a0ff3746b3897a1cda0ae5deb52abf1d7630bb1ca6a9b9e6dc550fa9d03a65af81ea7d2d1f10ea4c46f8dfd146f091df01c64f4849de0722c644ea599", 0x9b}, {&(0x7f00000071c0)="73f9bd2eb4e4c4b0218ed22497458d0fae5ffff584aa9f35b2afbb7bf9a011db904b20e63f95aecd179e994dd6eb769871cae71b03682c2a8a6ed88f38044ca8bbcf5606d3bdc8a752b0dbfba2c54ace9ff02d2b4407a34a8434845effb1af27e230a6d0e4cd", 0x66}, {&(0x7f0000007240)="dea47dbc8a70fa08411129c51e581f64f5128e8d98f35188ae3eafc7b8a63ff0a61ab40a7b374d76e3b78296045d27f2b0bd53ddc4b7baec23eb4f94c90f3c677668ba5db791aa38b549b670fb8a6f3428f37630aa5826dcf3241d6945ddefbe77b140df9614890328ce7551448e66a8e460229dc73ab98365656eec5e92a1b224c12bf7f8994fdd92c7466bacc83511eaeb6b513b20a9d3e7bf18d4511040ce1c632ff6b6bb688fd6c34020f70a0a21dce0e353859be02a2115c34d8aee46c6814ac0886380ea5fd8d33377adb2bbe2efed98039233456f4edb773303a0b6", 0xdf}, {&(0x7f0000007340)="b990bb57d7a89c38db636183a964fbaa627943421b3dc61e4f85b7e346a70dcac7bea6997924085482e877748beaaa80bcf54361d9de2881ab9a10d26dcdb6b24f75c2eec9257baf243aa22ec8fe2ec98f13322ee453f157a60c47eb04112048ccb8462fb24200602d755e02c1d05290496934b1f145", 0x76}], 0x7, &(0x7f0000007440)=[{0x88, 0x100, 0x7, "4a24fd8326f4e9a077f6a97dd105ce4179464eecc3651e426c54f47f268f3e5670de774b8323bd7039dbf1bc605dd07bd69dc818ef20302344a94c737221e44250483fed48bece431cd97f189c240fa1d8f677834b2e78b798d7aacf3acb35fe76724335d2e02ee9285c0c177ce7c32ebd790806aaa525"}, {0x78, 0x116, 0x0, "d34360151375cc1b924a0fbf4221cad066caedbf2711a437362041a70653f17b3cbca3f925ed96f66389c467cf8129c545ee931796448c2984f856a76cdbd2a3c6448513c73b5cdba645ea54c26aaa987c8182e2024a8179d9296c545e00cdd5801c"}, {0x90, 0x115, 0x8, "676d11e2e8d044fb2fe3e1a075d04dd3da2fb932570c33237319e99a862f0a4a86c9d3d23b33eeac8fe0689cc331db81058eef2a056f5a697b695e05b2d30454f5115d01629b17eccdada0525a76bd1561250e5311cf601cba9378d240e9a3cb3d682d3c640bb103ab32db5130597bbb242adc1f46f89d73061e41bc0bf1"}, {0x1010, 0x108, 0x7fcc, "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"}], 0x11a0}}, {{&(0x7f0000008600)=@rc={0x1f, @none, 0x8}, 0x80, &(0x7f0000008700)=[{&(0x7f0000008680)="e173aab3af2819b216b01a8ed8db67baa059da90162676e5eccade968ac94afbaff27d85fb9eb77c1b6876538c19e57b4fef4be8b2029fa09e79c49e854128d524", 0x41}], 0x1, &(0x7f0000008740)=[{0xb0, 0xff, 0x6, "d1617d417b7e7f405483fab1ceb0348c2c37f4160a4e492b6dcf270ee445e1f1a5b0c81aeaa172c3caeea768f99024bd622327a8ab7a4cc054733695c47537369b5f76f7240ccd1a8fed7c22a9c6a44332ad1a5537acb7b6ac20d7278c8f25e0800bc950f2258048a5166d75969ad98fa5888f42be696f5c7a7da6eba5af7ed9377442d9d49873afd190f96e55cfbe5eb24c1c20b410482357c5df609b59d0"}], 0xb0}}, {{0x0, 0x0, &(0x7f0000008ac0)=[{&(0x7f0000008800)="b979cf796ee993066e9d8561e9ab6703db35035904e1fb57de823ba3ee746a49882f722d42a0613c27ca60fe4713a7e4acf4f8cbb7ecaa2721bfbd320461046e1fc14c4366930cb51b90d49907e40b6d3677b0241669ec044142510f98223ae7d6d39b02a0db52e4ba42449f7c2d0dda7b0aaa938bf2ea307286f50a4da3d3136e5fe324430fce780bf0f74360", 0x8d}, {&(0x7f00000088c0)="68051921cd5c1c0567ed2cfdfc78d6f4b65173977e70df5a0aaccdcd6865fafb8bc50d2779579a1b2620ab16539f6d9a16b0eb2187825d224111e5aa81e1e4ed683fbf0d15ab57a699f4eb4415cf6a9099e3609e439ef5dd9e5e62d8b7", 0x5d}, {&(0x7f0000008940)="5400340d9c056290a366d63be640acb59b81204502be8f26e4f1a20d95", 0x1d}, {&(0x7f0000008980)="c5958faf3af997c1b49ae02fb8bd41801873d742186ac82f2911dfe07f75208d78bd76e5b84ec7ef74ffbe4f11c0f2d02c2184f3abed7b307b1163d363e9dca91f82b9b5e990875dadc59b3ea82b7d17c3081ac0618c389fd0971092f10ccdee97ffed4e1851f5e1bd95aafe40d6089df1a180908056d180bb3b", 0x7a}, {&(0x7f0000008a00)="4021580f0c175f3fab86220525d672934fe0e1106ba5babf4720ba8ba8150122dc11135ce87888182dc53e96aa7d2e4aa9e1787bcb1a90212b254a50b24ce30b6aa9bbe4411ebb489667a20433b795729ccc86602b09adb47ea4e8cb56560f6cbe7ae5dd5937d3d5d9636a14d5fac14faef8a6ea6e8f2189bfae2934e79983563c78586c522e401c2a4a1e4cc472add7e614d4fb0d3aa61db090329b444069bffa7baaef75ed55e9030f78ae02495323584ab901288e06df27a4", 0xba}], 0x5}}, {{&(0x7f0000008b40)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x80, &(0x7f0000008d00)=[{&(0x7f0000008bc0)="49d30c89d5008c89477d42779622eefc279e7c97f6fa332684ea102e584dc7611ea15de417220c3bfe065c55561d092c2fee7a8e1dab1d94f212e7bbb592e96c377d2a7ef340786dd553beae401a5b507df34c61a1b3dabfdd569ebd1758c190bb23ac4b62fcdcb8ae245dc3e8e6f8ea19646a127f80da4afa", 0x79}, {&(0x7f0000008c40)="5c82265fa5820c5c97d045bd9a86de7e171bc76561ca170e7392fc76182a6bfa358c794cd709d1840cd6f754538742b2313650f1b544b4336e17e1a3622749aa836cf795097924dad44adffded23c4d68f095873b5c3794d8b30316ef48fbbd37d13ba1a50527456292786895538298b158d501430f4dfe1aed610db0027bd759eb93535", 0x84}], 0x2, &(0x7f0000008d40)=[{0x50, 0x101, 0x26, "957c0762336dc7a3991f692cbc3c2bb29e3721363e4b91db63df422b9047cc240a7a896a8d0d2801ecbb7427e9ce1393efe47eb56a021c696d"}, {0x18, 0x88, 0xc4a7, "a34bd0bf30"}, {0x20, 0x116, 0x8, "664e186709d4b5811f7381f2485b4c"}], 0x88}}, {{&(0x7f0000008e00)=@ipx={0x4, 0x80, 0x2, "cf152ad98ad1", 0x61}, 0x80, &(0x7f000000a080)=[{&(0x7f0000008e80)="a23777dba7378d243227a50d51391499686f09680b4d0aa131330c1e2a8b0fb4ecf9773099550f19afd909e309f2c918950fee0c08c2264f8688b7359f6e2a8797c30957cc7fbbd02713bc4b2a1c51bee8c6e1905c4234a91d68cfcef65d21807d96f514b20f686fc423e90a5749f583d1d22aaf1f64600d4956bfebb96beb2f960865d4c4705363b279b2a652807f31395170057e00b8496658bbe7b269d98fd14422dabdd680bcba7af47e98e23c1071550f13bee0eaf6a299ce0b224c18d5ce74d9d72607d0385061b024aece5b858eeac9", 0xd3}, {&(0x7f0000008f80)="8abcc0fbb0b5a571a4428dd30277372d0348819222502c726e28350b7506104969651403347df877f7eda91ceb728c19875f6a3b340a7a47cd9041788b3589e851e974b01af16ff2ecee5846c6a82522a6cb31ed57b9698d87ec6d9a1ed4f3813c0704c83e74f58873a463906c469065444daf2c0bc391363f7044314ae7d5e49b823689ded35a9eae4e3500f14d8a91ceaef5f472a052033418d5d11d38c7e446b86079689d3dc661d72733fa745aa3d058a353d0e3c58eb5cb2d842c29ab5379abd6683c2c", 0xc6}, {&(0x7f0000009080)="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", 0x1000}], 0x3, &(0x7f000000a0c0)=[{0x58, 0x10c, 0x8000, "df2e4ff5d193a3cd1fc4ad9700c3225191924b1544c65f6becdbba3fdb07ed36b642ba8fa6504b78469cc497459ad66b789302fd791036f79018964dee74c7a5645f42"}], 0x58}}, {{&(0x7f000000a140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @remote}, 0x1, 0x2, 0x2, 0x4}}, 0x80, &(0x7f000000a1c0)}}, {{&(0x7f000000a200)=@llc={0x1a, 0x3, 0x3, 0x0, 0xf8, 0x80, @multicast}, 0x80, &(0x7f000000a280), 0x0, &(0x7f000000a2c0)=[{0x20, 0x103, 0x15, "65cfa35b3d0566ad71d8b74e"}], 0x20}}], 0xa, 0x0)

21:32:50 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4d}, @mcast2}})

21:32:50 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x8c02], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x25000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:50 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x6c, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x40000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  565.661705][T22551] EXT4-fs (loop2): re-mounted. Opts: (null)
[  565.676770][T22551] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:51 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900002e900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:51 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x70, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:51 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x8e02], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x48000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4e}, @mcast2}})

[  565.800179][T22574] EXT4-fs (loop1): Can't read superblock on 2nd try
[  565.837557][T22591] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  565.846674][T22574] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x4c000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
mount$incfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./bus\x00', &(0x7f0000000200), 0x0, 0x0)
unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0)
fdatasync(r0)

21:32:51 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x9a02], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x74, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x60000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x76, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:51 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b4f}, @mcast2}})

[  565.872271][T22591] EXT4-fs (loop2): re-mounted. Opts: (null)
[  565.889629][T22591] EXT4-fs (loop2): re-mounted. Opts: (null)
[  565.911163][T22612] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:51 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900003f900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:51 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x7a, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x68000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xaa, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x6c000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xba00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  566.034707][T22620] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  566.043721][T22641] EXT4-fs (loop1): Can't read superblock on 2nd try
[  566.059382][T22648] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:51 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200), 0x904820, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
r1 = getpid()
sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0)
syz_open_procfs(r1, &(0x7f0000000040)='fdinfo/4\x00')
sched_setattr(r1, &(0x7f0000000080)={0x38, 0x0, 0x1000007b, 0x40, 0xe39, 0x6, 0x0, 0xf5, 0x5, 0x1}, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10)

21:32:51 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000040900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x74000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0xc0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:51 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xbf01], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b50}, @mcast2}})

[  566.084209][T22620] incfs: Can't find or create .index dir in ./file0
[  566.124842][T22620] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x7a000000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  566.127535][T22648] incfs: Can't find or create .index dir in ./file0
[  566.147045][  T524] BUG: Dentry ffff88819b29e440{i=0,n=.index}  still in use (2) [unmount of ext4 loop2]
[  566.156760][  T524] ------------[ cut here ]------------
[  566.162230][  T524] WARNING: CPU: 0 PID: 524 at fs/dcache.c:1597 umount_check+0x179/0x1c0
[  566.170538][  T524] Modules linked in:
[  566.174434][  T524] CPU: 0 PID: 524 Comm: syz-executor.2 Not tainted 5.4.114-syzkaller-00361-gd05959f84917 #0
[  566.184481][  T524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  566.194541][  T524] RIP: 0010:umount_check+0x179/0x1c0
[  566.199809][  T524] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 20 f2 e8 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 97 e5 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff
[  566.219396][  T524] RSP: 0018:ffff8881ab34fc58 EFLAGS: 00010282
[  566.225438][  T524] RAX: 0000000000000054 RBX: ffffffff85fa9460 RCX: 1efb70fa140f7900
[  566.233382][  T524] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000
[  566.241330][  T524] RBP: ffff8881f1754420 R08: ffffffff814e8767 R09: ffffed103edc5e08
[  566.249280][  T524] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000
[  566.257225][  T524] R13: 0000000000000002 R14: 0000000000000000 R15: ffff88819b29e440
[  566.265176][  T524] FS:  0000000001ded400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[  566.274079][  T524] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  566.280635][  T524] CR2: 00007ffdc6f52f18 CR3: 00000001ab768000 CR4: 00000000001406f0
[  566.288585][  T524] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  566.296555][  T524] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  566.304500][  T524] Call Trace:
[  566.307773][  T524]  d_walk+0x2d9/0x540
[  566.311730][  T524]  ? __d_free+0x20/0x20
[  566.315862][  T524]  shrink_dcache_for_umount+0x8a/0x1a0
[  566.321314][  T524]  generic_shutdown_super+0x63/0x2a0
[  566.326575][  T524]  kill_block_super+0x79/0xd0
[  566.331226][  T524]  deactivate_locked_super+0xaf/0x100
[  566.336585][  T524]  deactivate_super+0x1b3/0x270
[  566.341577][  T524]  ? deactivate_locked_super+0x100/0x100
[  566.347199][  T524]  ? dput+0x4de/0x5d0
[  566.351160][  T524]  ? _raw_spin_lock_irqsave+0x210/0x210
[  566.356702][  T524]  ? find_next_bit+0xc6/0x110
[  566.361358][  T524]  cleanup_mnt+0x432/0x4e0
[  566.365754][  T524]  task_work_run+0x186/0x1b0
[  566.370321][  T524]  prepare_exit_to_usermode+0x2b0/0x310
[  566.375842][  T524]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  566.381711][  T524] RIP: 0033:0x4678b7
[  566.385581][  T524] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  566.405160][  T524] RSP: 002b:00007ffdc6f53658 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[  566.413550][  T524] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000004678b7
[  566.421498][  T524] RDX: 00007ffdc6f5372c RSI: 0000000000000002 RDI: 00007ffdc6f53720
21:32:51 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xc005], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xa0040000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:51 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xd202], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  566.429448][  T524] RBP: 00007ffdc6f53720 R08: 00000000ffffffff R09: 00007ffdc6f534f0
[  566.437394][  T524] R10: 0000000001deebeb R11: 0000000000000246 R12: 00000000004becda
[  566.445339][  T524] R13: 00007ffdc6f547f0 R14: 0000000001deeb00 R15: 00007ffdc6f54830
[  566.453306][  T524] ---[ end trace 5003755935f2a172 ]---
[  566.470253][  T524] VFS: Busy inodes after unmount of loop2. Self-destruct in 5 seconds.  Have a nice day...
21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xc0050000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  566.481719][T22657] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:51 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xd602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b51}, @mcast2}})

21:32:51 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x2, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:51 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000048900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0xf8010000], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x3000)
mount(&(0x7f0000000280)=@sr0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='pvfs2\x00', 0x2109010, &(0x7f0000000340)='\x00')
creat(&(0x7f0000002cc0)='./file1\x00', 0x182)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
accept4(r1, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80, 0x80000)
fdatasync(r0)
syncfs(r0)
umount2(&(0x7f0000000140)='./file0\x00', 0x9)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0)
preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
getpeername$unix(r3, &(0x7f0000002c00), &(0x7f0000002c80)=0x6e)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0)
preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
sendmmsg(r2, &(0x7f0000002b40)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000380)="aed9e87ef4bef05dd5fcb62df587a862245a6d9036e18f1502cd23f1fc085458f90c1cbb9d12505a495271494fdc95f97020cdf4e2baeb940f488dad8e14bb2d33b48041e9edeabccfe7c54831e95af3aa4fbf58c6f4ebdbdfe291d9ce1e5e724e22e69d9a8b3fc10bacd3949d80137b92089fac46804a630d3ad7cf6da265fdd2dd077049abc64352eb2c1f5241b22ca91b7b5b87ea57070a0ddb718009904dc74e094db0eb23774445fb", 0xab}, {&(0x7f0000000440)="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", 0xfe}, {&(0x7f0000000540)="690a8f8f02317177dfad53131019eae1fce0b821160532623ae95d", 0x1b}], 0x3, &(0x7f00000005c0)=[{0xd8, 0x10d, 0x401, "33d4ddd91ef52ec70f9ba00751ff3c3e820bdaef3e7b9ecca2eacca32b132cae9ce50cfa730d48b23c40d11eb625c8df2505ab8e4723a5975493fc1da09bad36f6c281ebfa5a4c2ab3be1bca28e5e5f29a6aff246aec29227379f68a1adc6ba0bc1be706e9a69c26e2a3de45db23d161445d43bacc6c0be0474e4af0a063fce72af5a325e832bceb0ce6c657d089741ff783b96c3382df3bed5fec2548aa1d375c52c75f601b19b03bbd75a3864dccf93c5943724dc6b4c0d85245c2a5d78d27d6a5f8604131dce5"}, {0x88, 0x1, 0x5, "2bce6edafbdd5ee25e6e00978bc325bb9a4a77906a8bf12d2a8d7033828c81e7b1912d6674047f6467974f956f74c12da50b5a432e9114f61e0bec78c233f453261e8b4b9f49426b228b5f58094a19f48be37f8c42ecd6ef9ab8c7a35871aab39c0b850b1d0f5899f0fe03d0d32550b5752ca868fc59f576"}, {0xe0, 0x11, 0x2, "09532cf80cacbc617549b0d7fa4d2418769accfe37aad6e7c3fab6bcb1ae99301d505289baaabafb0200aad3e8be3874f65b1b10b628875e7771908dcce6a8a0470d805a41c629c8e63d185ccf3b0aaddea762f1f3e492784e6d2b26fac33fc386b9203dcb90d41bdf69de4f2fafa06e8018af425be2b6139c1bc646d6692d7f6d525543b8a48785c8e628ed1dae024c8a4f5bca93a29af3886bd1ec8d7cc75c6b1caf6d6382621c1117fe938116a07ed4cc72d267871eab162ede67df0db2a9b38cce93024fcf49d25e7c"}, {0x90, 0x10c, 0xff, "de3840eceb15450da9ffe996d17cd8210c2fa750ab85bacd87ec81ebd5316f9f22613dba315db8aabb885d75812f549c0b008e7c8c182a0f05c0371b3b93adb30e60b28733e3d43d639414676fe9034e02faefa953a2bea80c3d65038eca8cc97020cbe0d0d9944d7f979cf36fa3b24528fa24a887504ed1a3fb943734195d91"}, {0xb0, 0x112, 0x5, "07c9d56aea6fad54ba0de741e2c9296a23df02e1aad5af3fb0ca22ad72696cdb8bf9f791a5d357769903f13c798e16b22a3d612a7ffb570f3d051f71d61a36cf698a492a7fc7e29da5a32e3e55dc287784ccea2ad825e96add113aecc488ed45898c4b24ac4ac382a456b40dd86df4db8f71d93a5c78943169b8456b59a8d6e86bf7490a3e298075c30311a6b090843a6a7488fea666923fb234"}, {0x50, 0x113, 0x2, "9807eeb7d1b27c5e03c305feb7ee89774e5f8884c2c271df3e499b515f815da6b53913676afca0276eb8bcefd6003d5e83bc15a5526153073ec9"}, {0x40, 0x117, 0x147, "854ec0f6e794f6e8e679438bdd5368f5bd3719daf7278c44e0d6be069b5ea32a00ebe8d60e6705008041d132a70b76bf"}, {0xb0, 0x107, 0x9, "a5d8b0e984b3e1e5e760c8f69baf1f19044ac80726cfd8e41ad52332857f285447e294279ad55b7b84f8dd315a7e2ebcf81650c9cb9df17e1863e197c2987afff40452482d41ea8c330806f5cce72edbbfe7df49eb2d1d3a58db4631d32a7ec1e2417b5956d6f36ea6332543368aeca531b2ec46b0918e6e0dfba1e9d7d80a61c377a93e46b5e833b420c66033eef358441d1d9638928911ad7791"}, {0xc8, 0x10c, 0x4, "f04b474cb8b53c87621827937153535612e63418b8a586a77d168090ecbcf6fee60ed4c6b6b00331a6cbc7dcec0afb254ee92f0a49535d15253d8285441959df8020cd3dd91212631ff194e41eb9229187fe3d4f7cea76d6ef04ce43cc22515f187d3fe7504d7c4b7726770bc5a390b95d472f657ffdbb663f626442fe6f708e761ea988156a5b669edcb9a6f5aec5da61a4bbef1e00a606c5689d694cd05db10d80bba78286c19aa34250af33b51d6bdab454f90e"}], 0x588}}, {{&(0x7f0000000b80)=@isdn={0x22, 0x7, 0xff, 0x0, 0xff}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000c00)="a4759caf8d600ab388cf578f74ee", 0xe}, {&(0x7f0000000c40)="84806dd302b0304b2e55bb7832797121faaa52ab579a3d1cc6c1744a466af705890603a6854d51dbc99b9f45204af41d3524ac8692a142a709355765fcc277b952221a0ea6247d12d09ff0c8911c5aceb418366f6b3fd2b694bdbd778351ad34080042e68c739d0a0906dbcbbfbf69698e38936f0ad42ba74b88b6c3b8f5b7fa3e52ebb33572c0e4e81f83a56657476dffabc3d87331", 0x96}, {&(0x7f0000000d00)="b993c13eac07254c13f3a44cb9a5f01f51d7664cae37837f3df69f46759ac0415352efda4d8c91fe8506a787073ad01158471d47e892a2213e335b483fe8295f1c39d04cc09cb5c1052fae0d", 0x4c}, {&(0x7f0000000d80)="fa3da7b2130cc082743c8b04bc51f15bae181956d443310781a6f72dbb1c02c9d898232d666dffcd781c42064e01a5359d7683fc63bfac7a27f0763ada335a24fc10ada16880c2d34cbad92d", 0x4c}, {&(0x7f0000000e00)="925622f275398ef02742795a377238d3f4944fe5e9f36bd0735a3cfaf21908e8f5bc0ee5a6b1c5d17a95154b2562c4", 0x2f}, {&(0x7f0000000e40)="2af64f0194fe24c6d54c33bfd30ad0f109bccb16060b221ecbc0f68831689cfa9fdec9aaed0e6fa0c4fa68cab503aca1df1d69b33a1efe1e03dc6aa33b0d9d4e48dee1aa6eb65178aa2918e2cf3eea097931578619eb119592a01591da59b97a64e4d9ee179d097b745cf5ab554b06f262b75f9b87d0e3f09d89aa81bf4badccf0d697177b251bb27d6b6f1172b98fbb6bcb1ed0bc95d6eccfa32ae175f8e60a73f27bfb8f334f0728adbd9659854f99364a31ad211481543ab7e6499fb0d8eabbe25db0b7b8bb0e26ddd3c7db6590a5df4bd547", 0xd4}, {&(0x7f0000000f40)="d9d14dd6d69e602011d79cba22473265c4f206ba4125c0a34c23c4d4cf5e0254f3c810fca34953164a7787171f22e6cb24e8c1a3bf9fe14ab148743cb9f999882ac97bd18111afd36b914fdc150a244146ca515397cad971d15204db8c21a66192bad3a08d47c8d34b92a7ae850d09d316557248a975f2a15a0bc0613357a2bf52bb90b58b80d948f0e544f016ef827a4a2901abeabc81a54230289dcfa512db5b662891676c39342675071eb7e3f5d08eb376fddb3203986760b114431fa1722fa521b828b762d8e093d117", 0xcc}, {&(0x7f0000001040)="1513e26fe99f7c363a3a5c62cdc9872132d50dcf34c4d02996a8e153911a3fc435c08896002631c810f5248b2e1e4c6c7ac03dd5ea4a582860ce4d915ee20896", 0x40}, {&(0x7f0000001080)="d50928c7fa0e392a2e70fe534eb40bbb1fc1d644ef983c70502b41cf2c7a7136cf5ffe487ef08ccd74ead6cc9c0dbb9b229bd61ac4dd5a5feadcbd7bcce54203f6a018b0a406f65e07896b053267baa002c48b6bbf6dc1b73bf8475c94019d8dadeca8753c", 0x65}], 0x9, &(0x7f00000011c0)=[{0xd8, 0x118, 0x32a5, "cb515ac1f6327b68949eef50899650cb52adb05af72211a1450b1f8adc52587c4520f9d28add15b2a055cff2476b18db1343dfbb59d5e113d36b1d1a39e9cf51e045415b82fa701a1c58bd048766a16b5111eb5731b81ad6a7b4f800c4f935b19e1f3650e566919ca731027a8910d71bf96040ef18ea22b4d34a3217c071de9400cbbba3aa43681ef72cace65c04e8e4cb996b621b77df8316ac8fb77f21ae04812ba5290032a355dcb878b51a5c9489ce86a1fd4c565080b5291d18feaf2169ac6f2b25a28e87"}], 0xd8}}, {{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f00000012c0)="3cab6abca53432f18f48a6b690dacd3e78d1b5de92192ad19e6af659c15a44ea4b0e0b90868b0b5649b188c9ae8a5035fb8b87fc6948577b5a22ad87a9063a75ed781710408d13ba8fbaa6310f6f7061396abb5da289c6651b64576c975eb754b5c42acf4afc85f4313fa86d73f65c3a0f3e646dbaf264", 0x77}, {&(0x7f0000001340)="f86846b3c78f2c8a2a5ca0a775b325b9c3d5ad0e498461af925096020247b43264ffa95fe2bc469f77e1c7bc06f5f741ec02d0c36ae6c344fd91007ef8d20dbbb1674a470e4ac30946f4b1e0ffc24cb698c419e5d59ebfdcc9779db1386b5b8cf36585962f33b65be861e3f96fb121647963abec3d8644f33c6a2217bb3d118c11084b2a4349c6bf168d379d4a720e0948e80a83b9439f9c79b74e04163a88d5520b8c9a039439860a", 0xa9}, {&(0x7f0000001400)="187e20", 0x3}, {&(0x7f0000001440)="78823088d9e44a7be1b1cdda82c422be980d8899b3ec185571541e241867de49a945dc5439cbd276fa1d4b8f8774fda928b08821053f611a642bf5cc97821ef86e5bea22142285e20a4243e18932dc351a5f9ed177932095a51366bb5201915be21bbff4f5f3567bb7629da72e8e4d61c5fe98dfd42c013f01f0f924595577701f333b3515c3e498db9a47e40ba9e242d1c20ad5ff9e574170bbd7ceb4218e1c856481f71915ea8b360d63f93366d2f181", 0xb1}, {&(0x7f0000001500)="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", 0x1000}], 0x5, &(0x7f0000002580)=[{0x90, 0x10f, 0x7, "c2d89434f2d7ccca48fd9b7f8af57f6c31132e347d125e9ccdef293f6089ad1282af75769ca18476751121e4c213caf9107e9a933088344eecf243211f1edb497ed5f245ebd34921f8a9ffebcf6fa1f957a9484d320bb152aaac4aca5f8f9ea7cf8f22a0d9bc9deaf45a82da6351050e5bf99da492fd0533b35d2a63e749a949"}, {0x108, 0x10a, 0x9, "c8be808488be0e59d1b1f1fa5b894960daca013c5bdf36a141e4e3cca7d1fe58e9be94455f2356b3a57e4f72d7ef054d4e9f8c073f8003cbb84e1852ba3a75f6805d591b57a5ce986b74a30495e70ff834e655e58e764974ac30c4bac243cd4c18ff46c24547e8add7b9cb617efab924f9aca66c24baeec2dae202a7a82d11c3ec6f6dcf6a18280523ecfa9aaa1476c8d14be95bd3ec55f11437502fa7066b23d71f307e3d92d6d96b38081ccc7bd2f62b5ed8b85efc6190e2246ecd1d5993d89518a1b740741dd8d951d103ec0907bf63d5f4b7222de06668bb7095be57608879299e453488e2308576eb4dcbfeb4d7c114"}, {0xc0, 0x116, 0x8, "1ef835980e27752ceca35511cf7a3a1361ae17152c925d1abaf88f2bfd8e1af71051d2d28a85bf7a7adf20f26dd4d4634c529fd50cf6f3e9d7a511bb64ef1bba198e5e4267462ae0fecf7c07a4923ba2434df12581016508cfee51d3ac00eb2058e7ba48f89f28c89da27c3dd10b3c94e6b664c21d3f62f4c67a5371b440b3419553a8a015277a4088e240cb09cd397eb72042bb9b7ed04399ef512ed7789f48db2f661a959914b51304c132babe32"}, {0x90, 0x110, 0x7, "347b99b7f764126d8044655a7541dffdd2b076fbcaa9df1f393e1c5612b2ff37034cb20dcc299dce3506a23eedcb732453400f9ae6cdcf318c478ac8d9b34c58b63758a6211770c34010d6bb83272f645d316efd985405fd0bea78b92d4551756b794756bb4e83345a581700fc01fe1411a1d8793099cc4abafd1c9cea155d21"}, {0xc0, 0x107, 0xc9, "6f48f9f7329faf60f6ec21edcdeb89a54e8fd429815d5f65070100351d3fbae30285edc7dd4823849efb47a9a1479413fadb84a7d444be21b5d7e465e40f4d80b184c2181d2ef9ef04b38b319ba0f63fa22fb9c08baef9192120f3b92c17c219f49927e86887bda37b7c352fea289a01ea7ea22c5c796e627e78f5074882db60e5f54f2a69e152538258e20d26a43d1100e1669aec958b58fe72510d30fd2a8bc3e11c1760096f9e0866d4b145fdd8"}, {0x100, 0x109, 0x3, "1575d59daf1ea9f857f1de2f90a390af3ee4eb95373b34943c862bc6ee13936c65725e91e47f915be586c59343539927bf3a8c3c19bbedf5b3242bf4780a93e9c65823aa4376463b304ae6047af4b97e945c7002186e3614db95abcc9c067b31a50a192365f9b11b7a7c787e932dd99f1a63af4d336c4c401c3fe5570846b19f950b987b74d21ad2745663c8c6b192f618233704ba1b44739b5c682ad992e80bbecd198fde083c6a832e893d92528b55c36441aa5199c37efd68153a3b34bd8f9bd41dea33213a29b31b45a8994b799e135eab6b0aa01ac3d9bcca7eda969306c4ee36b5c6ba658c416a48"}, {0x100, 0x10f, 0x3, "99a85c067b0b698fe1e73e504104185f927102dd5ca322acff1379b090ac98fe4d51b3dcd8255ac9479af4c2ab642ffb91b176743a59dc3de9dd3c4c84ab9cae3a92435a1c8a1145501fc2c58d6f93de58a8b869d7776b0312f061b9f7e46b350b4ff98789011e5c2115d0ee589d80d9d3f25d4340f3dd3b9a9fd036a315049b1f27f76cf0e7f1c6eae827234fbd076533684e3f3051872f81764b6cdfc6959810bd303096a0d20b59f923686664e426698b8d6c938f07d93989d42cac9a05198457cc3eacb0e79df85a8d56f9818164359b486bc5455e5dc0d3b8d74575657f461b16ad5bf08966bb005083"}], 0x5a8}}], 0x3, 0x810)

21:32:51 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xdb00], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  566.572168][T22657] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:51 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xe401], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x2], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:51 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b52}, @mcast2}})

21:32:52 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x3, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  566.678792][T22701] EXT4-fs (loop1): Can't read superblock on 2nd try
[  566.704262][T22704] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
21:32:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900004c900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x3], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xe803], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x4], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  566.728776][T22704] EXT4-fs (loop2): re-mounted. Opts: (null)
[  566.737334][T22701] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xea03], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  566.787152][T22704] EXT4-fs (loop2): re-mounted. Opts: (null)
[  566.799691][T22733] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x5], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000300)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
rmdir(&(0x7f0000000040)='./file0\x00')
fdatasync(r0)
ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'batadv_slave_1\x00', &(0x7f0000000080)=@ethtool_sfeatures={0x3b, 0x3, [{0x3c1e, 0x4}, {0x1ff, 0x2}, {0x3, 0x9c61}]}})
syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/user\x00')
fstat(r0, &(0x7f0000000280))

21:32:52 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x4, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:52 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b53}, @mcast2}})

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xf602], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x6], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000060900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xf801], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x5, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  566.948377][T22748] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  566.950197][T22733] EXT4-fs (loop1): Can't read superblock on 2nd try
[  566.968725][T22748] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x7], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xf803], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000280)=@ethtool_rxnfc={0x30, 0xb, 0x1, {0x11, @hdata="40567a0df769ee8b5d3a2fd17b852f1670ce19a77fb7b01da18f037b771b731deca612e27baecfac111be2eced4448e90d0b8ec5", {0x0, @random="e9e04911eafd", 0x5, 0x8, [0x2, 0x2]}, @tcp_ip4_spec={@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4e22, 0x6}, {0x0, @empty, 0x401, 0x200, [0xa42f, 0x8]}, 0x4, 0x80000000}, 0x5, [0x3c8, 0x6, 0x80000001, 0x5, 0x3]}})

21:32:52 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b54}, @mcast2}})

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xfb06], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  567.061897][T22748] EXT4-fs (loop2): re-mounted. Opts: (null)
[  567.078378][T22768] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:52 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x6, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xfc06], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x9], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000068900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  567.143144][T22768] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0xa], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xfe03], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b55}, @mcast2}})

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0xb], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  567.222285][T22789] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  567.252960][T22789] EXT4-fs (loop2): re-mounted. Opts: (null)
[  567.259215][T22803] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:52 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffd}, {&(0x7f0000012600)="ed4100001000fcfffffffffffff4bf6db35d655f00000041e9835d0080", 0x1d, 0x4400}], 0x800000, &(0x7f00000000c0)=ANY=[])
mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='cpuset\x00', 0x4000, &(0x7f00000002c0)='ext4\x00')
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x2)

21:32:52 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x7, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900006c900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1fd74], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0xc], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x40000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b56}, @mcast2}})

[  567.282001][T22789] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0xd], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x1000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x2000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0xe], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  567.353396][T22826] EXT4-fs (loop1): Can't read superblock on 2nd try
[  567.392079][T22826] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x3000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  567.407230][T22832] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks)
[  567.468478][T22851] cgroup: Unknown parameter 'ext4'
21:32:52 executing program 2:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0)
ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040))
r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0)
ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040))
r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x1}, {&(0x7f0000000080)="9b000040000000000000000082e36724c6f34caa846ed2e5277033c6924568eda7800498b69b5fb37c3078010040", 0x2e, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000280)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r0, @ANYRES32=r0, @ANYRES64, @ANYBLOB="82f22277aa0bb23f136e23867b199acc30738c462e1a4177cd1f7f7806fdb7eb8f068cdc3ef7926da020d9487a1b0bfe9bb84e1363966c9b1f21eeaa3bd73a5eb6", @ANYRESOCT, @ANYRES16=r0, @ANYRES64=r1])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r2)

21:32:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000074900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x10], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x8, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:52 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b57}, @mcast2}})

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x4000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x5000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x11], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  567.501900][T22832] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks)
[  567.511994][T22832] cgroup: Unknown parameter 'ext4'
21:32:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900007a900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x6000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  567.565895][T22864] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x12], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b58}, @mcast2}})

[  567.611523][T22864] EXT4-fs (loop1): Can't read superblock on 2nd try
[  567.616426][T22873] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
21:32:52 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
rmdir(&(0x7f0000000040)='./file0\x00')
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x7000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0x9, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x25], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:52 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x8000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b59}, @mcast2}})

21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x48], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x9000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  567.691224][T22896] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[  567.715857][T22894] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:53 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000190000e3900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x4c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xa000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0xa, 0x0, 0x0, 0x0, @remote, @mcast2}})

[  567.752995][T22904] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  567.787988][T22904] EXT4-fs (loop2): re-mounted. Opts: (null)
[  567.796565][T22894] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:53 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080))
fdatasync(r0)

21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x60], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b5a}, @mcast2}})

21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x68], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xb000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  567.825938][T22927] EXT4-fs (loop2): re-mounted. Opts: (null)
[  567.846265][T22931] secmark_tg_check: 130 callbacks suppressed
[  567.846270][T22931] xt_SECMARK: invalid mode: 0
[  567.864710][T22936] xt_SECMARK: invalid mode: 0
21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x6c], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xc000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  567.873691][T22933] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:53 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0xb, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:53 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000190000e4900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  567.916280][T22947] xt_SECMARK: invalid mode: 0
[  567.924401][T22951] xt_SECMARK: invalid mode: 0
21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x74], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xd000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  567.965572][T22949] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  567.971127][T22960] xt_SECMARK: invalid mode: 0
[  567.982538][T22959] EXT4-fs (loop1): Can't read superblock on 2nd try
[  567.992641][T22963] xt_SECMARK: invalid mode: 0
21:32:53 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000190000e5900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:53 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b5b}, @mcast2}})

21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x7a], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
openat(r0, &(0x7f0000000040)='./file0\x00', 0x20200, 0x42)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
fdatasync(r0)

21:32:53 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0xe000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  568.015795][T22965] EXT4-fs (loop2): re-mounted. Opts: (null)
[  568.031283][T22959] EXT4-fs (loop1): Can't read superblock on 2nd try
[  568.034897][T22949] EXT4-fs (loop2): re-mounted. Opts: (null)
[  568.058996][T22970] xt_SECMARK: invalid mode: 0
21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x1f8], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x10000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  568.072962][T22974] xt_SECMARK: invalid mode: 0
21:32:53 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', r3, 0x0, 0xc, 0x0, 0x0, 0x0, @remote, @mcast2}})

21:32:53 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000fff900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x300], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x11000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

[  568.123683][T22982] xt_SECMARK: invalid mode: 0
[  568.129243][T22983] xt_SECMARK: invalid mode: 0
[  568.147757][T22973] EXT4-fs (loop1): Can't read superblock on 2nd try
21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x4a0], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000002900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="0000006d2d23bbbdae15f4261683ad00000000000000000082e36724c6e5845ba7fb", 0x22, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[])

[  568.212125][T22987] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue
[  568.224402][T22994] EXT4-fs (loop1): Can't read superblock on 2nd try
[  568.225779][T22987] EXT4-fs (loop2): re-mounted. Opts: (null)
21:32:53 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x45b5c}, @mcast2}})

21:32:53 executing program 2:
r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[])
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80061, 0x0)
open(&(0x7f0000000040)='./file0\x00', 0x121000, 0x5)
fdatasync(r0)

21:32:53 executing program 4:
ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [0x0, 0x12000000], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x25, 0x6, 0x690, 0x4a0, 0x4a0, 0x1f8, 0x4a0, 0x1f8, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [0x0, 0x0, 0x500], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6fe)

21:32:53 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0)
preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0)
r2 = socket(0x11, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e030