[ 878.125388][T25532] RBP: 00007fb2cf7911d0 R08: 0000000000000000 R09: 0000000000000000
[ 878.133410][T25532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 878.141408][T25532] R13: 00007ffd85e8fadf R14: 00007fb2cf791300 R15: 0000000000022000
[ 878.149409][T25532]
07:59:51 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0xeb7f0000}}], 0x2, 0x0)
07:59:51 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x300000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:51 executing program 0:
clone(0x21100, &(0x7f0000000200)='y', &(0x7f0000000240), 0x0, 0x0) (fail_nth: 23)
07:59:51 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4000000000)
07:59:51 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0xeffdffff}}], 0x2, 0x0)
07:59:52 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x400000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:52 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x202000000000)
07:59:52 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0xf4010000}}], 0x2, 0x0)
[ 878.350489][T25545] FAULT_INJECTION: forcing a failure.
[ 878.350489][T25545] name failslab, interval 1, probability 0, space 0, times 0
[ 878.363176][T25545] CPU: 1 PID: 25545 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0
[ 878.371595][T25545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 878.381651][T25545] Call Trace:
[ 878.384927][T25545]
[ 878.387860][T25545] dump_stack_lvl+0xd6/0x122
[ 878.392456][T25545] dump_stack+0x11/0x1b
07:59:52 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x500000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
[ 878.396657][T25545] should_fail+0x23c/0x250
[ 878.401080][T25545] ? alloc_vfsmnt+0x81/0x2e0
[ 878.405747][T25545] __should_failslab+0x81/0x90
[ 878.410515][T25545] should_failslab+0x5/0x20
[ 878.415025][T25545] __kmalloc_track_caller+0x6d/0x370
[ 878.420318][T25545] kstrdup_const+0x51/0x90
[ 878.424816][T25545] alloc_vfsmnt+0x81/0x2e0
[ 878.429238][T25545] clone_mnt+0x40/0x8c0
[ 878.433400][T25545] copy_tree+0x313/0x890
[ 878.437713][T25545] copy_mnt_ns+0x11d/0x850
[ 878.442128][T25545] ? kmem_cache_alloc+0x221/0x320
07:59:52 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0xfffffdef}}], 0x2, 0x0)
07:59:52 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x200000000000000)
[ 878.447238][T25545] ? create_new_namespaces+0x3c/0x560
[ 878.452780][T25545] create_new_namespaces+0x89/0x560
[ 878.457981][T25545] ? security_capable+0x91/0xa0
[ 878.462840][T25545] copy_namespaces+0x116/0x160
[ 878.467639][T25545] copy_process+0x14fc/0x2f30
[ 878.472324][T25545] ? get_pid_task+0x90/0xc0
[ 878.476848][T25545] kernel_clone+0x15c/0x6a0
[ 878.481356][T25545] __x64_sys_clone+0xc6/0xf0
[ 878.485965][T25545] do_syscall_64+0x44/0xa0
[ 878.490389][T25545] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 878.496314][T25545] RIP: 0033:0x7fb2d1a1aae9
07:59:52 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x600000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
[ 878.500795][T25545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 878.520413][T25545] RSP: 002b:00007fb2cf791188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 878.529176][T25545] RAX: ffffffffffffffda RBX: 00007fb2d1b2df60 RCX: 00007fb2d1a1aae9
[ 878.537199][T25545] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 0000000000021100
07:59:52 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x400000000000000)
[ 878.545198][T25545] RBP: 00007fb2cf7911d0 R08: 0000000000000000 R09: 0000000000000000
[ 878.553169][T25545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 878.561146][T25545] R13: 00007ffd85e8fadf R14: 00007fb2cf791300 R15: 0000000000022000
[ 878.569179][T25545]
07:59:52 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0xffffff7f}}], 0x2, 0x0)
07:59:52 executing program 0:
clone(0x21100, &(0x7f0000000200)='y', &(0x7f0000000240), 0x0, 0x0) (fail_nth: 24)
[ 878.777188][T25575] FAULT_INJECTION: forcing a failure.
[ 878.777188][T25575] name failslab, interval 1, probability 0, space 0, times 0
[ 878.789873][T25575] CPU: 0 PID: 25575 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0
[ 878.798303][T25575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 878.808363][T25575] Call Trace:
[ 878.811724][T25575]
[ 878.814707][T25575] dump_stack_lvl+0xd6/0x122
[ 878.819313][T25575] dump_stack+0x11/0x1b
[ 878.823476][T25575] should_fail+0x23c/0x250
[ 878.827934][T25575] ? alloc_vfsmnt+0x81/0x2e0
[ 878.832561][T25575] __should_failslab+0x81/0x90
[ 878.837345][T25575] should_failslab+0x5/0x20
[ 878.841940][T25575] __kmalloc_track_caller+0x6d/0x370
[ 878.847390][T25575] kstrdup_const+0x51/0x90
[ 878.851849][T25575] alloc_vfsmnt+0x81/0x2e0
[ 878.856290][T25575] clone_mnt+0x40/0x8c0
[ 878.860541][T25575] copy_tree+0x313/0x890
[ 878.864983][T25575] copy_mnt_ns+0x11d/0x850
[ 878.869410][T25575] ? kmem_cache_alloc+0x221/0x320
[ 878.874446][T25575] ? create_new_namespaces+0x3c/0x560
[ 878.879836][T25575] create_new_namespaces+0x89/0x560
[ 878.885050][T25575] ? security_capable+0x91/0xa0
[ 878.889959][T25575] copy_namespaces+0x116/0x160
[ 878.894745][T25575] copy_process+0x14fc/0x2f30
[ 878.899441][T25575] ? get_pid_task+0x90/0xc0
[ 878.903955][T25575] kernel_clone+0x15c/0x6a0
[ 878.908519][T25575] __x64_sys_clone+0xc6/0xf0
[ 878.915062][T25575] do_syscall_64+0x44/0xa0
[ 878.919519][T25575] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 878.925436][T25575] RIP: 0033:0x7fb2d1a1aae9
[ 878.929854][T25575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 878.949469][T25575] RSP: 002b:00007fb2cf791188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 878.957891][T25575] RAX: ffffffffffffffda RBX: 00007fb2d1b2df60 RCX: 00007fb2d1a1aae9
[ 878.965876][T25575] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 0000000000021100
07:59:52 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa00000000000000)
07:59:52 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x800000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:52 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x8000000000}}], 0x2, 0x0)
[ 878.973858][T25575] RBP: 00007fb2cf7911d0 R08: 0000000000000000 R09: 0000000000000000
[ 878.982023][T25575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 878.990009][T25575] R13: 00007ffd85e8fadf R14: 00007fb2cf791300 R15: 0000000000022000
[ 878.998128][T25575]
07:59:52 executing program 0:
clone(0x21100, &(0x7f0000000200)='y', &(0x7f0000000240), 0x0, 0x0) (fail_nth: 25)
07:59:52 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0xa00000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
[ 879.073009][T25585] FAULT_INJECTION: forcing a failure.
[ 879.073009][T25585] name failslab, interval 1, probability 0, space 0, times 0
[ 879.085697][T25585] CPU: 1 PID: 25585 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0
[ 879.094115][T25585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 879.104215][T25585] Call Trace:
[ 879.107522][T25585]
[ 879.110452][T25585] dump_stack_lvl+0xd6/0x122
[ 879.115076][T25585] dump_stack+0x11/0x1b
07:59:52 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x2000000000000}}], 0x2, 0x0)
07:59:52 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc00000000000000)
[ 879.119323][T25585] should_fail+0x23c/0x250
[ 879.123750][T25585] ? alloc_vfsmnt+0x2b/0x2e0
[ 879.128415][T25585] __should_failslab+0x81/0x90
[ 879.133229][T25585] should_failslab+0x5/0x20
[ 879.137740][T25585] kmem_cache_alloc+0x4f/0x320
[ 879.142640][T25585] alloc_vfsmnt+0x2b/0x2e0
[ 879.147268][T25585] clone_mnt+0x40/0x8c0
[ 879.151429][T25585] copy_tree+0x313/0x890
[ 879.155687][T25585] copy_mnt_ns+0x11d/0x850
[ 879.160115][T25585] ? kmem_cache_alloc+0x221/0x320
[ 879.165275][T25585] ? create_new_namespaces+0x3c/0x560
07:59:52 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x4000000000000}}], 0x2, 0x0)
[ 879.170688][T25585] create_new_namespaces+0x89/0x560
[ 879.175923][T25585] ? security_capable+0x91/0xa0
[ 879.180835][T25585] copy_namespaces+0x116/0x160
[ 879.185672][T25585] copy_process+0x14fc/0x2f30
[ 879.190568][T25585] ? get_pid_task+0x90/0xc0
[ 879.195107][T25585] kernel_clone+0x15c/0x6a0
[ 879.199628][T25585] __x64_sys_clone+0xc6/0xf0
[ 879.204347][T25585] do_syscall_64+0x44/0xa0
[ 879.208862][T25585] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 879.214778][T25585] RIP: 0033:0x7fb2d1a1aae9
07:59:52 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x5000000000000}}], 0x2, 0x0)
[ 879.219194][T25585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 879.238809][T25585] RSP: 002b:00007fb2cf791188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 879.247225][T25585] RAX: ffffffffffffffda RBX: 00007fb2d1b2df60 RCX: 00007fb2d1a1aae9
[ 879.255284][T25585] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 0000000000021100
[ 879.263259][T25585] RBP: 00007fb2cf7911d0 R08: 0000000000000000 R09: 0000000000000000
07:59:53 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x40000000000000}}], 0x2, 0x0)
[ 879.271234][T25585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 879.279255][T25585] R13: 00007ffd85e8fadf R14: 00007fb2cf791300 R15: 0000000000022000
[ 879.287246][T25585]
07:59:53 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000000000000000)
07:59:53 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0xf00000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:53 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0xb4000000000000}}], 0x2, 0x0)
07:59:53 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x1000000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:53 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5)
mlock(&(0x7f00006ef000/0x4000)=nil, 0x4000)
07:59:53 executing program 0:
clone(0x21100, &(0x7f0000000200)='y', &(0x7f0000000240), 0x0, 0x0) (fail_nth: 26)
07:59:53 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x1100000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:53 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x100000000000000}}], 0x2, 0x0)
07:59:53 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
r1 = fsopen(&(0x7f0000000240)='bdev\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000080)="abe59b5ef52baab3ba0da1d2107e941be14080048e0dd9bff2c1df87a4d7f6808f9df45b7f874606121e42208e46841bc404fdb2de44fc4dd24ca22c8b6648d574082562dba5e7ee6de5edb7d03ede256b01198b2e6b2c4af6f8ee96fc7458100a1f058999a0", 0x66)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
[ 879.547452][T25617] FAULT_INJECTION: forcing a failure.
[ 879.547452][T25617] name failslab, interval 1, probability 0, space 0, times 0
[ 879.560113][T25617] CPU: 1 PID: 25617 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0
[ 879.568527][T25617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 879.578588][T25617] Call Trace:
[ 879.581868][T25617]
[ 879.584797][T25617] dump_stack_lvl+0xd6/0x122
[ 879.589477][T25617] dump_stack+0x11/0x1b
[ 879.593634][T25617] should_fail+0x23c/0x250
[ 879.598062][T25617] ? alloc_vfsmnt+0x81/0x2e0
[ 879.602756][T25617] __should_failslab+0x81/0x90
[ 879.607526][T25617] should_failslab+0x5/0x20
[ 879.612056][T25617] __kmalloc_track_caller+0x6d/0x370
[ 879.617376][T25617] kstrdup_const+0x51/0x90
[ 879.621817][T25617] alloc_vfsmnt+0x81/0x2e0
[ 879.626376][T25617] clone_mnt+0x40/0x8c0
[ 879.630532][T25617] ? delay_tsc+0x96/0xe0
[ 879.634786][T25617] copy_tree+0x313/0x890
[ 879.639042][T25617] copy_mnt_ns+0x11d/0x850
07:59:53 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x1400000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
[ 879.643526][T25617] ? kmem_cache_alloc+0x221/0x320
[ 879.648565][T25617] ? create_new_namespaces+0x3c/0x560
[ 879.653950][T25617] create_new_namespaces+0x89/0x560
[ 879.659162][T25617] ? security_capable+0x91/0xa0
[ 879.664125][T25617] copy_namespaces+0x116/0x160
[ 879.668921][T25617] copy_process+0x14fc/0x2f30
[ 879.673695][T25617] ? get_pid_task+0x90/0xc0
[ 879.678289][T25617] kernel_clone+0x15c/0x6a0
[ 879.682805][T25617] __x64_sys_clone+0xc6/0xf0
[ 879.687406][T25617] do_syscall_64+0x44/0xa0
[ 879.691889][T25617] entry_SYSCALL_64_after_hwframe+0x44/0xae
07:59:53 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
r1 = syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="faff69b48501f427f52aa536d971621389a87a2166584f5dd8c36d7cdc576f3fc26d79fa8e354818f86ba13f903a0fabcc4472b8ba0a78ed91dccb896249ccc0278dafa96ede69de3e6cf78f2c9e698f4e5fea515ddfbbe870fec833ab7804c357f72b8a97f67258ae2c89517392e0dee05756d3991191228f0b295d28fe905f37e3cd16d21fcb37ab53e8a1bfbebfb443fbdac7414bbab036cefd6cfc37a753aeab57dc70bc947da50629f6257c3f0fb0eb1ecd69b7a310df0bf1", 0xbb, 0x200000}, {&(0x7f00000001c0)="0b6a055c891a34efa9833362797e46763baa667d5e756190e6944eef9825810813ae20344eb5458ed9b7b658f2e79ba3fef0e608c3fbe45ef74b5782071883ed6a9972f843155098ab30a24aaebccef613c142a79ce1769a4e34b270f56e2f0d5754", 0x62, 0x3ff}], 0x0, &(0x7f0000000280)={[{'\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b'}, {'\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b'}, {'\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b'}, {'[.\xc6&/6*+[\xd1'}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b'}}, {@seclabel}, {@measure}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@smackfstransmute}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]})
r2 = fsopen(&(0x7f0000000240)='bdev\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0)
mmap(&(0x7f0000581000/0x2000)=nil, 0x2000, 0x1000000, 0x20010, r2, 0xefb6b000)
sendfile(r0, r1, 0x0, 0x4)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
[ 879.697856][T25617] RIP: 0033:0x7fb2d1a1aae9
[ 879.702353][T25617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 879.722118][T25617] RSP: 002b:00007fb2cf791188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 879.730530][T25617] RAX: ffffffffffffffda RBX: 00007fb2d1b2df60 RCX: 00007fb2d1a1aae9
[ 879.738570][T25617] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 0000000000021100
07:59:53 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x2400000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
[ 879.746546][T25617] RBP: 00007fb2cf7911d0 R08: 0000000000000000 R09: 0000000000000000
[ 879.754650][T25617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 879.762628][T25617] R13: 00007ffd85e8fadf R14: 00007fb2cf791300 R15: 0000000000022000
[ 879.770692][T25617]
07:59:53 executing program 3:
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x10, 0x800, 0x0)
sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="240000002e0007101dfffd946fa2830020200a0002000000000000e50c1be3a20400ff7e", 0x24}], 0x1}, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1)
clone3(&(0x7f0000000240)={0x4000000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0, {0x26}, &(0x7f0000000140)=""/30, 0x1e, &(0x7f0000000180)=""/88, &(0x7f0000000200)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x9}, 0x58)
syz_open_procfs(r1, &(0x7f00000002c0)='statm\x00')
07:59:53 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x200000000000000}}], 0x2, 0x0)
07:59:53 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x2500000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:53 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x300000000000000}}], 0x2, 0x0)
07:59:53 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x2a130d0000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:53 executing program 0:
clone(0x21100, &(0x7f0000000200)='y', &(0x7f0000000240), 0x0, 0x0) (fail_nth: 27)
07:59:53 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x3400000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:53 executing program 3:
memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
memfd_create(&(0x7f0000000080)='\'{\'\x00', 0x5)
r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x1e003, 0x0)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x3000002, 0x810, r0, 0x9257d000)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
connect$unix(r1, &(0x7f0000000000)=@file={0x1}, 0x6e)
recvmmsg$unix(r1, &(0x7f00000008c0)=[{{&(0x7f0000000100), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000180)=""/54, 0x36}, {&(0x7f00000001c0)=""/157, 0x9d}, {&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000300)=""/254, 0xfe}], 0x4, &(0x7f0000000440)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000000480), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0x52}], 0x1, &(0x7f00000005c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/130, 0x82}], 0x2, &(0x7f0000000780)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x140}}], 0x3, 0x2, &(0x7f0000000980))
07:59:53 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x400000000000000}}], 0x2, 0x0)
[ 880.112375][T25650] FAULT_INJECTION: forcing a failure.
[ 880.112375][T25650] name failslab, interval 1, probability 0, space 0, times 0
[ 880.125135][T25650] CPU: 1 PID: 25650 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0
[ 880.133654][T25650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 880.143780][T25650] Call Trace:
[ 880.147064][T25650]
[ 880.149998][T25650] dump_stack_lvl+0xd6/0x122
[ 880.154678][T25650] dump_stack+0x11/0x1b
07:59:53 executing program 4:
r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = signalfd4(r0, &(0x7f0000000300)={[0x1]}, 0x8, 0x80000)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xac, 0x3f, 0x0, 0x0, 0x0, 0x6, 0x40, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x5, 0x62}, 0x8020, 0xffffffffffffff00, 0x0, 0x5, 0xad, 0x2, 0x40, 0x0, 0x200, 0x0, 0x3}, 0xffffffffffffffff, 0x3, r1, 0x9)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0)
r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0}, {0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "2156816c73038c"})
ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x0, 0x0, 'client0\x00', 0x7, "580a10da6ecde8b8", "ce2a652e9be6de9e65fa4176426b5f6606e5b59df627bed476be2ff9099cfe15"})
r120 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r120, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, 0x0}, {}, {0x0}, {}, {}, {0x0}, {r93}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {r71}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {r94}, {0x0}, {0x0}, {}, {0x0, r15}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {r23}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {0x0}, {0x0, r6}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {r48, 0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r92}, {0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, r68}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {r50}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {r78}], 0x0, "2156816c73038c"})
ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0})
perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x7fffffff, 0x100, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058a80)={0x21, [], 0x9, "726b97fe52e6b8"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004ef40)={0x631, [{r32, r222}, {r11}, {r184, r34}, {r210, r89}, {r137}, {r177}, {}, {}, {r25, r39}, {0x0, r5}, {r31, r190}, {r123}, {r166, r86}, {r76, r150}, {r169}, {0x0, r52}, {r203}, {0x0, r153}, {r145, r217}, {}, {}, {}, {0x0, r132}, {r84}, {0x0, r62}, {r172, r111}, {0x0, r176}, {0x0, r204}, {}, {0x0, r139}, {r58}, {r76, r18}, {0x0, r102}, {0x0, r140}, {0x0, r43}, {}, {}, {0x0, r113}, {}, {r22, r141}, {0x0, r171}, {0x0, r98}, {r94, r114}, {0x0, r64}, {0x0, r33}, {r229}, {r116}, {0x0, r112}, {0x0, r70}, {r38, r57}, {}, {}, {r208, r40}, {0x0, r216}, {r133}, {}, {0x0, r119}, {r165}, {}, {r209, r49}, {r131}, {}, {r94}, {r97, r109}, {r81, r82}, {}, {}, {0x0, r80}, {r130, r13}, {r53, r74}, {r26}, {}, {r181}, {r133, r4}, {r84, r188}, {0x0, r226}, {0x0, r170}, {r218, r163}, {r46}, {}, {r106, r152}, {r164, r10}, {0x0, r39}, {}, {}, {r103, r167}, {}, {0x0, r105}, {r60, r224}, {0x0, r202}, {0x0, r149}, {r51, r138}, {}, {r60}, {}, {0x0, r225}, {}, {r85, r212}, {}, {0x0, r211}, {}, {}, {r194, r55}, {0x0, r127}, {0x0, r221}, {r88}, {}, {}, {r91, r107}, {0x0, r163}, {}, {0x0, r41}, {}, {r135}, {0x0, r157}, {r168, r179}, {}, {r220, r14}, {r201, r226}, {}, {r66, r144}, {0x0, r231}, {r227, r56}, {0x0, r73}, {}, {r173}, {}, {r207}, {0x0, r21}, {r44, r121}, {0x0, r30}, {}, {0x0, r67}, {r61, r45}, {0x0, r125}, {}, {}, {r122, r49}, {0x0, r77}, {}, {r159}, {}, {r36, r118}, {0x0, r65}, {r168}, {r172, r132}, {r28}, {}, {}, {0x0, r83}, {}, {0x0, r99}, {r156}, {r206}, {}, {r220, r63}, {r214}, {r200, r128}, {r81}, {}, {r19}, {r182}, {r230, r183}, {}, {0x0, r205}, {}, {r27, r79}, {0x0, r147}, {r24, r161}, {0x0, r178}, {}, {}, {r160}, {r87}, {r91}, {0x0, r213}, {r155}, {}, {r148}, {r174}, {0x0, r187}, {0x0, r142}, {}, {r134}, {}, {}, {}, {r35}, {}, {r143}, {}, {r191}, {r37}, {r76, r7}, {0x0, r193}, {}, {}, {r162, r189}, {r124, r215}, {}, {}, {r59}, {r95}, {r135, r110}, {r17}, {}, {}, {r72, r42}, {r104}, {r180}, {r16}, {r69}, {r198, r75}, {r12}, {}, {r196, r136}, {r54}, {}, {r16}, {0x0, r185}, {r101, r219}, {r115}, {}, {0x0, r158}, {}, {0x0, r73}, {}, {r223, r117}, {0x0, r129}, {}, {0x0, r197}, {r9}, {}, {r108, r86}, {r47}, {r26, r228}, {0x0, r126}, {}, {}, {r151, r29}, {0x0, r20}, {r172}, {r53}, {r154, r96}, {0x0, r192}, {0x0, r100}, {}, {r186, r199}, {r59, r10}, {r8, r195}, {r32}, {}, {}, {r146}, {r175, r90}], 0x81, "ae239e3d56f41d"})
ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000180)={0x1, 0x1, 0x1000, 0x9a, &(0x7f0000000640)="e1c4c4ebe6152fcc4d0d77acada61485b9a272ca0a5d3562ab720b2fdc464a9140d28d85a981194a15a251d2521f56e7e71e8571c2ca2411a93ed40d044794706c564c1022a7cbf572129100fa0b576621a6a94f705123b317aea70be52591131de8f82dce538438cff557f9be34fc0a2a4abf28978b2511bea12330d6c427bd69aa9541544af77132368d4c862659259e864861fb92363beb80", 0x0, 0x0, &(0x7f0000000700)})
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440))
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='sessionid\x00')
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
pipe(&(0x7f00000000c0))
[ 880.158841][T25650] should_fail+0x23c/0x250
[ 880.163318][T25650] ? alloc_vfsmnt+0x81/0x2e0
[ 880.167920][T25650] __should_failslab+0x81/0x90
[ 880.172696][T25650] should_failslab+0x5/0x20
[ 880.177259][T25650] __kmalloc_track_caller+0x6d/0x370
[ 880.182588][T25650] kstrdup_const+0x51/0x90
[ 880.187732][T25650] alloc_vfsmnt+0x81/0x2e0
[ 880.192158][T25650] clone_mnt+0x40/0x8c0
[ 880.196326][T25650] copy_tree+0x313/0x890
[ 880.200678][T25650] copy_mnt_ns+0x11d/0x850
[ 880.205097][T25650] ? kmem_cache_alloc+0x221/0x320
[ 880.210187][T25650] ? create_new_namespaces+0x3c/0x560
[ 880.215659][T25650] create_new_namespaces+0x89/0x560
[ 880.220875][T25650] ? security_capable+0x91/0xa0
[ 880.225842][T25650] copy_namespaces+0x116/0x160
[ 880.230681][T25650] copy_process+0x14fc/0x2f30
[ 880.235397][T25650] ? get_pid_task+0x90/0xc0
[ 880.239906][T25650] kernel_clone+0x15c/0x6a0
[ 880.244422][T25650] __x64_sys_clone+0xc6/0xf0
[ 880.249023][T25650] do_syscall_64+0x44/0xa0
[ 880.253446][T25650] entry_SYSCALL_64_after_hwframe+0x44/0xae
07:59:53 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x35e0123300000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
[ 880.259472][T25650] RIP: 0033:0x7fb2d1a1aae9
[ 880.263894][T25650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 880.284016][T25650] RSP: 002b:00007fb2cf791188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 880.292542][T25650] RAX: ffffffffffffffda RBX: 00007fb2d1b2df60 RCX: 00007fb2d1a1aae9
[ 880.300544][T25650] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 0000000000021100
07:59:53 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x4000000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:54 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x4102000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
[ 880.308560][T25650] RBP: 00007fb2cf7911d0 R08: 0000000000000000 R09: 0000000000000000
[ 880.316543][T25650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 880.324519][T25650] R13: 00007ffd85e8fadf R14: 00007fb2cf791300 R15: 0000000000022000
[ 880.332562][T25650]
07:59:54 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x500000000000000}}], 0x2, 0x0)
07:59:54 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000003780), 0x1101, 0x0)
pwrite64(r1, &(0x7f0000000080)="15a4", 0x2, 0x0)
getdents64(r1, &(0x7f0000000080)=""/21, 0x15)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
07:59:54 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x600000000000000}}], 0x2, 0x0)
07:59:54 executing program 0:
clone(0x21100, &(0x7f0000000200)='y', &(0x7f0000000240), 0x0, 0x0) (fail_nth: 28)
07:59:54 executing program 4:
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0)
r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0}], 0x0, "2156816c73038c"})
ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x0, 0x0, 'client0\x00', 0x7, "580a10da6ecde8b8", "ce2a652e9be6de9e65fa4176426b5f6606e5b59df627bed476be2ff9099cfe15"})
r13 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r13, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x0, "2156816c73038c"})
ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0})
perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x7fffffff, 0x100, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000180)={0x1, 0x1, 0x1000, 0x9a, &(0x7f0000000640)="e1c4c4ebe6152fcc4d0d77acada61485b9a272ca0a5d3562ab720b2fdc464a9140d28d85a981194a15a251d2521f56e7e71e8571c2ca2411a93ed40d044794706c564c1022a7cbf572129100fa0b576621a6a94f705123b317aea70be52591131de8f82dce538438cff557f9be34fc0a2a4abf28978b2511bea12330d6c427bd69aa9541544af77132368d4c862659259e864861fb92363beb80", 0x0, 0x0, &(0x7f0000000700)})
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440))
r14 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000003780), 0x1101, 0x0)
pwrite64(r14, &(0x7f0000000080)="15a4", 0x2, 0x0)
perf_event_open(&(0x7f0000000300)={0xaa91a64dc0191c09, 0x80, 0x1f, 0x2, 0x1, 0x7, 0x0, 0x100000000, 0xc0640, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc16, 0x2, @perf_config_ext={0x2b, 0x67f}, 0x800, 0x4, 0x1, 0x4, 0x400, 0x8, 0x3, 0x0, 0x9, 0x0, 0x4}, 0xffffffffffffffff, 0xd, r14, 0xb)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
pipe(&(0x7f00000000c0)={0xffffffffffffffff})
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x3d, 0xc0, 0x9, 0x1, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xaa, 0x0, @perf_config_ext={0x6, 0x2}, 0x40000, 0xfffffffffffff062, 0xb4f4, 0x0, 0x6, 0x4, 0x9711, 0x0, 0x80000000, 0x0, 0x3362}, 0x0, 0xe, r15, 0x2)
07:59:54 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x5800000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:54 executing program 3:
r0 = memfd_create(&(0x7f0000000740)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc04\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7Ax\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2\x17\xb7Rvd\xcb:\b\x1f\xb1\xebV\x0eV\x1b\xc6\xbe]R\xa8m\x89|kq\xcdE\xc2L\x8dX>\xbb\xbfU\xb6\xfe\xc3\xaeU\r6\x84H4:\xaf\xad\xff\xebl\x95\xb6\x91\xbftR,\xff\xb4\x89-\xac\xdc\xa4\xbd\xd6\t\x82{h\x12\x98\x91\x0e\xe1\x96\x02\xa4\x12\xdf\xc2\xb1\xb6\x05\x02N0:]\xe3\x05\x00\x18q\x87\xd0m\x97\x10\xf8\xc2\xe1\x8abL\xcf}?2jR0\xd6:\xe8\x80\xca\x04 ^\xf1\xf7=}\xc3\xb1O', 0x5)
r1 = fsopen(&(0x7f0000000240)='bdev\x00', 0x0)
fsmount(0xffffffffffffffff, 0x1, 0x70)
fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0)
r2 = eventfd(0x8)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000340)='.pending_reads\x00', 0x3400, 0x50)
r4 = fsopen(&(0x7f0000000240)='bdev\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0)
r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000003780), 0x1101, 0x0)
pwrite64(r5, &(0x7f0000000080)="15a4", 0x2, 0x0)
r6 = fsopen(&(0x7f0000000240)='bdev\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0)
r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000580)='ns/uts\x00')
r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000003780), 0x1101, 0x0)
pwrite64(r8, &(0x7f0000000080)="15a4", 0x2, 0x0)
fsmount(r8, 0x0, 0x4)
r9 = open_tree(r0, &(0x7f0000000640)='./file0\x00', 0x81200)
io_submit(0x0, 0x7, &(0x7f0000000700)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, &(0x7f0000000080)="4cb886d1f7e5dafc715538b245cd90a2afeef8889049e6c33e2fda056081ebd7ef3af7a9d2661726906ec4ca826b0735fe4ec65eef66f4e7cd54965e155b3103d6f57894d154efc8051cd6a87d151ffea0b5405cec6bba63f25a422d22c035c285e149f33af63c77b3cf503f307708b456f8d13ce1cf239dbd6f669d10c6995cc990e91437e0f6a62b4054830c394497b26278b616626df401013e5a9098b97d6f40b0af11e3b8322dd93f61fca6494bdd6812611adcd8e9bf87251af385d365fe862f14282743", 0xc7, 0x203, 0x0, 0x3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x6, r1, &(0x7f00000001c0)="270295d114879c1fefc84a3937f0d592ee87d3d689199a8e7ad6cac78c1c5c22f370581c5c946983b0ec9b3a895f1d604678c623c186c0373cf089f93348a61b9039d246f9958117bc01fab787432bf5ccf09d042c400570417bb0b5fed89a6e89db6650105615036a2956c487506bb3d90bc373ea2927f07fa21416a882082fedac44c182b35806f634024c0890b8969a44ae21", 0x94, 0x0, 0x0, 0x0, r2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x5, 0x4, r0, &(0x7f00000002c0)="7de728eb232b98c8d8305d01c0736ee7bde05d6678e2d4571017bc69bdec8e1cd048c95e9a807c5940e316113690cb2aee59c8c9951250f330c72b8f729252486708d617f2e2bd8127c4ee34303834a8bbce971b0c11", 0x56, 0x1, 0x0, 0x0, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x8, r4, &(0x7f00000003c0)="204515f2f6f36a4cb7850ceaa153ccee7f786423cfd559c96f52e8c058c3cd0a24697151268ba3e815c779ccdd50b86187fe67e3f29ab4cf6a7b2d4103b55f77db92f2c83cd0959275fd718bc8be8cd5a116b5962a76f6f109ae1e288508ecf1b391ac1d6f84c51c60cdecfb51506a4fd3daf04b3256d67d", 0x78, 0x95, 0x0, 0x2, r5}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x6a81, r6, &(0x7f0000000480)="d54f8af723b2a6415bc5769a3afb935a3a0531cd1fb9e9c5975c70cb3f177bf34b57842170c71c142665dd1e1ecce8a342f25ec283e3b16ca10035b02e9aa79f58a17695246bfbf250789f5f1ef36006b8749f2aa848f7b084118b3689efd43dda339621d706adda59f590059cdc40120402b45e75580c89c2fa365a920e78ec72bace9c85f88071c4f58b005dff97ceaaaf1f07d189875672f32024f7c145f2b93215d520297f46ed7f81cc073555", 0xaf, 0xe3, 0x0, 0x2}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x5, 0x284a, r7, &(0x7f00000005c0)="1b149c2d107285599af74bd06599", 0xe, 0x5, 0x0, 0x1, r8}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x6, 0x5, r9, &(0x7f0000000680)="27780911455c75463a317fd2c8612ca2e55b8e", 0x13, 0x5, 0x0, 0x2}])
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
07:59:54 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x800000000000000}}], 0x2, 0x0)
07:59:54 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x7e00000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:54 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0xa00000000000000}}], 0x2, 0x0)
07:59:54 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0x8000000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:54 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
shmget$private(0x0, 0x4000, 0x1000, &(0x7f000022c000/0x4000)=nil)
r1 = fsopen(&(0x7f0000000080)='debugfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0)
mmap(&(0x7f0000347000/0x4000)=nil, 0x4000, 0x3, 0x1010, r1, 0x7ff08000)
07:59:54 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0xf00000000000000}}], 0x2, 0x0)
07:59:54 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000003780), 0x823101, 0x0)
pwrite64(r1, &(0x7f0000000080)="15a4", 0x2, 0x0)
ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0100001a060000002e2f66696c653000"])
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
07:59:54 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x1000000000000000}}], 0x2, 0x0)
[ 880.829724][T25711] FAULT_INJECTION: forcing a failure.
[ 880.829724][T25711] name failslab, interval 1, probability 0, space 0, times 0
[ 880.842396][T25711] CPU: 1 PID: 25711 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0
[ 880.850931][T25711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 880.861053][T25711] Call Trace:
[ 880.864393][T25711]
[ 880.867331][T25711] dump_stack_lvl+0xd6/0x122
[ 880.872013][T25711] dump_stack+0x11/0x1b
[ 880.876256][T25711] should_fail+0x23c/0x250
[ 880.880687][T25711] ? alloc_vfsmnt+0x2b/0x2e0
[ 880.885293][T25711] __should_failslab+0x81/0x90
[ 880.890073][T25711] should_failslab+0x5/0x20
[ 880.894623][T25711] kmem_cache_alloc+0x4f/0x320
[ 880.899400][T25711] alloc_vfsmnt+0x2b/0x2e0
[ 880.903834][T25711] clone_mnt+0x40/0x8c0
[ 880.907997][T25711] copy_tree+0x313/0x890
[ 880.912265][T25711] copy_mnt_ns+0x11d/0x850
[ 880.916689][T25711] ? kmem_cache_alloc+0x221/0x320
[ 880.921725][T25711] ? create_new_namespaces+0x3c/0x560
[ 880.927111][T25711] create_new_namespaces+0x89/0x560
[ 880.932379][T25711] ? security_capable+0x91/0xa0
[ 880.937421][T25711] copy_namespaces+0x116/0x160
[ 880.942224][T25711] copy_process+0x14fc/0x2f30
[ 880.946916][T25711] ? get_pid_task+0x90/0xc0
[ 880.951473][T25711] kernel_clone+0x15c/0x6a0
[ 880.955983][T25711] __x64_sys_clone+0xc6/0xf0
[ 880.960636][T25711] do_syscall_64+0x44/0xa0
[ 880.965062][T25711] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 880.971139][T25711] RIP: 0033:0x7fb2d1a1aae9
[ 880.975555][T25711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 880.995174][T25711] RSP: 002b:00007fb2cf791188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 881.003664][T25711] RAX: ffffffffffffffda RBX: 00007fb2d1b2df60 RCX: 00007fb2d1a1aae9
[ 881.011818][T25711] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 0000000000021100
[ 881.019800][T25711] RBP: 00007fb2cf7911d0 R08: 0000000000000000 R09: 0000000000000000
[ 881.027884][T25711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 881.035960][T25711] R13: 00007ffd85e8fadf R14: 00007fb2cf791300 R15: 0000000000022000
[ 881.043947][T25711]
07:59:55 executing program 0:
clone(0x21100, &(0x7f0000000200)='y', &(0x7f0000000240), 0x0, 0x0) (fail_nth: 29)
07:59:55 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0xe803000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
07:59:55 executing program 4:
r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0)
r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000700)={0x0, ""/256, 0x0, 0x0})
ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000900)={r4, 0x0, "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", "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"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x0, "2156816c73038c"})
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x1)
ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x0, 0x2, 'client0\x00', 0x1, "000000ce19d36400", "ce2a652e9be6de9e65fa4176426bd476be7be2f106f1e2f25500", 0x0, 0xffffffff})
r19 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r20 = openat$incfs(0xffffffffffffffff, &(0x7f0000000240)='.pending_reads\x00', 0x400, 0x190)
ioctl$PERF_EVENT_IOC_SET_FILTER(r20, 0x40082406, &(0x7f0000000280)=',*\x00')
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r19, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r18}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}], 0x0, "2156816c73038c"})
ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0})
perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x7fffffff, 0x100, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000180)={0x1, 0x1, 0x1000, 0x9a, &(0x7f0000000640)="e1c4c4ebe6152fcc4d0d77acada61485b9a272ca0a5d3562ab720b2fdc464a9140d28d85a981194a15a251d2521f56e7e71e8571c2ca2411a93ed40d044794706c564c1022a7cbf572129100fa0b576621a6a94f705123b317aea70be52591131de8f82dce538438cff557f9be34fc0a2a4abf28978b2511bea12330d6c427bd69aa9541544af77132368d4c862659259e864861fb92363beb80", 0x0, 0x0, &(0x7f0000000700)})
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440))
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
pipe(&(0x7f00000000c0))
[ 881.333468][T25713] FAULT_INJECTION: forcing a failure.
[ 881.333468][T25713] name failslab, interval 1, probability 0, space 0, times 0
[ 881.346320][T25713] CPU: 1 PID: 25713 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0
[ 881.354901][T25713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 881.365055][T25713] Call Trace:
[ 881.368455][T25713]
[ 881.371381][T25713] dump_stack_lvl+0xd6/0x122
[ 881.376147][T25713] dump_stack+0x11/0x1b
07:59:55 executing program 3:
r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bk\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x5)
r1 = fsopen(&(0x7f0000000240)='bdev\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0xffffffffffffff8e)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x3012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
[ 881.380334][T25713] should_fail+0x23c/0x250
[ 881.384834][T25713] ? alloc_vfsmnt+0x81/0x2e0
[ 881.389457][T25713] __should_failslab+0x81/0x90
[ 881.394274][T25713] should_failslab+0x5/0x20
[ 881.398786][T25713] __kmalloc_track_caller+0x6d/0x370
[ 881.404120][T25713] kstrdup_const+0x51/0x90
[ 881.408568][T25713] alloc_vfsmnt+0x81/0x2e0
[ 881.413063][T25713] clone_mnt+0x40/0x8c0
[ 881.417226][T25713] copy_tree+0x313/0x890
[ 881.421470][T25713] copy_mnt_ns+0x11d/0x850
[ 881.425934][T25713] ? kmem_cache_alloc+0x221/0x320
[ 881.431025][T25713] ? create_new_namespaces+0x3c/0x560
[ 881.436410][T25713] create_new_namespaces+0x89/0x560
[ 881.441664][T25713] ? security_capable+0x91/0xa0
[ 881.446520][T25713] copy_namespaces+0x116/0x160
[ 881.451346][T25713] copy_process+0x14fc/0x2f30
[ 881.456035][T25713] ? get_pid_task+0x90/0xc0
[ 881.460624][T25713] kernel_clone+0x15c/0x6a0
[ 881.465134][T25713] __x64_sys_clone+0xc6/0xf0
[ 881.469783][T25713] do_syscall_64+0x44/0xa0
[ 881.474216][T25713] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 881.480189][T25713] RIP: 0033:0x7fb2d1a1aae9
[ 881.484603][T25713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 881.504388][T25713] RSP: 002b:00007fb2cf791188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 881.512801][T25713] RAX: ffffffffffffffda RBX: 00007fb2d1b2df60 RCX: 00007fb2d1a1aae9
[ 881.520782][T25713] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 0000000000021100
07:59:55 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x1100000000000000}}], 0x2, 0x0)
07:59:55 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x1400000000000000}}], 0x2, 0x0)
07:59:55 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1}}, {{0x0, 0x0, 0x0, 0x2400000000000000}}], 0x2, 0x0)
07:59:55 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@window, @mss, @timestamp, @window={0x3, 0x9}, @window, @window, @sack_perm, @sack_perm], 0x20e4)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000140)="6b686cfd9a855ec58b534163923c8d356462166d4ae43aab570bb108a9be1639ac55c9016d", 0x25}], 0x1, 0x0, 0xeb7f000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0)
[ 881.528780][T25713] RBP: 00007fb2cf7911d0 R08: 0000000000000000 R09: 0000000000000000
[ 881.536790][T25713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 881.544773][T25713] R13: 00007ffd85e8fadf R14: 00007fb2cf791300 R15: 0000000000022000
[ 881.552760][T25713]
07:59:55 executing program 1:
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000000)={0xffffffffffffffff})
perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x9, 0x0, 0x0, 0xd8, 0x0, 0x8, 0x462, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xf58e, 0x2, @perf_config_ext={0x825f, 0x7}, 0x20, 0x2, 0x7, 0x0, 0x8001, 0xfff, 0x2, 0x0, 0x1ff, 0x0, 0x93402f}, 0xffffffffffffffff, 0x5, r0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0,