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", 0x1000, 0x1f}, {&(0x7f00000002c0)="8c99be9e1cd9ab04d5d0622585f10bf395f2dd34ae5c3adeea51604eb02a2c28b25b4adb95d1", 0x26, 0x8000000000000000}, {&(0x7f00000015c0)="22479398f39ea60e9aa69c0c1a300faccd44e6f5feb1dbf6f729fa7b13fe70fa593bb09f2e520ba53f11a45e711a3e086c503faf8a6a70d9094fbb785e41fa88a87714a2217c9cb78372fcad4e3562f378ba941f9e3a94b08b95ad7a0418c726bd84b77a2ef9a4be554d33ffb0c3c531cc1eefe7dfd31912624d37caf52f7e7fc747cd6c642bdb752d99a866d2c73020534e5984ea1f40223e664a7fa9d6e10187dba1034af81928968f2b89beac627aa549797e4b6475fa26d820e5b82dda45cef96e3cda1ca91a365f4168ff2031bddb052ccb24149750c4bfd3c19d", 0xdd, 0xaf5}, {&(0x7f0000000300)="3c570d1cd7b57b01059c8abe640097", 0xf, 0x27dd}], 0x40, &(0x7f0000000340)={[{'&&(@'}, {'/dev/userio\x00'}], [{@fsname={'fsname', 0x3d, '/dev/userio\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) (async)
r3 = getuid() (async)
r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001980), 0x32900, 0x0)
perf_event_open$cgroup(&(0x7f0000001900)={0x3, 0x80, 0x4, 0xe7, 0xdb, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3e15, 0x2, @perf_bp={&(0x7f00000018c0), 0x4}, 0x5008, 0x80000001, 0x1, 0x8, 0x8000000000000000, 0x7b, 0xffff, 0x0, 0x2, 0x0, 0x1}, r4, 0xc, r0, 0x2) (async)
syz_mount_image$nfs(&(0x7f00000019c0), &(0x7f0000001a00)='./file1\x00', 0x0, 0x1, &(0x7f0000001a80)=[{&(0x7f0000001a40)="d271e49db63716ed278f205e", 0xc, 0x8000000000000000}], 0x100008, &(0x7f0000001ac0)={[{'(-'}, {}, {'access=any'}], [{@subj_user={'subj_user', 0x3d, 'xattr'}}]})
mount$cgroup(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='noprefix,release_agent?./file1,xattr,pcr=000000 0000000000063,fowner<', @ANYRESDEC=r3, @ANYBLOB=',smackfsroot=mpol,audit,obj_role=tmpfs\x00,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d5b242e2b0f2c66736d616769633d3078303030303030303030303030303030382c646f6e745f6d6561737572652c736d61636b6673666c6f6f723d3d72656c61746976652c00"])
mount$cgroup(0x0, 0x0, &(0x7f0000000340), 0x200000, &(0x7f00000004c0)={[{@noprefix}, {@noprefix}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@name={'name', 0x3d, '%&:^'}}, {@xattr}], [{@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio}]}) (async)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xff}, 0x2) (async)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x4, &(0x7f0000001780)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@privport}, {@afid={'afid', 0x3d, 0x3}}, {@cachetag={'cachetag', 0x3d, '%\xc2-'}}, {@loose}, {@cache_fscache}, {@uname={'uname', 0x3d, '/dev/userio\x00'}}, {@access_any}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/userio\x00'}}, {@fowner_gt={'fowner>', 0xee01}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x6}}, {@uid_eq={'uid', 0x3d, r3}}, {@smackfsroot}]}}) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:34 executing program 1:
ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000018c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r0=>0x0}})
ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000b40)={0x0, 0x0, {0x7, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, @struct={0x0, 0x2}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1]}, {0x0, @usage, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @usage=0x9f0, 0x0, 0x0, [0x4, 0x0, 0x0, 0x8]}, {0x0, @struct={0x8000, 0x20}, 0x0, 0x0, 0x400, 0x9, 0x80000000, 0x0, 0x22, @usage, 0x0, 0xb2, [0x0, 0x8, 0x7]}, {0x0, 0x1}})
ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000480)={0x1, 0x0, {0x401, @usage=0x80000000, 0x0, 0x7f, 0x101, 0x8001, 0x1, 0x2, 0x20, @struct={0x0, 0x101}, 0x9, 0x3, [0x2, 0x2, 0x800, 0x9, 0xffffffff, 0x3]}, {0x2, @usage=0x8, 0x0, 0x100, 0xed, 0x200, 0x1, 0x1, 0x22, @usage=0x5, 0x6, 0x16, [0x3, 0x1cb, 0x745c, 0x3, 0x4, 0x5]}, {0x6, @struct={0x9, 0x5}, r0, 0x69b, 0xb0c, 0xfffffffffffffc01, 0x5, 0x10000, 0x4c0, @usage=0x8001, 0x800, 0xe19c, [0x7f, 0x2, 0xabf3, 0x1, 0x8000000000000000, 0x4]}, {0x7ff, 0x10000, 0x9}})
mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x2, 0x0)

12:08:34 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

[  268.171361] 9pnet: Insufficient options for proto=fd
[  268.178996] vxfs: WRONG superblock magic 00000000 at 1
[  268.189311] vxfs: WRONG superblock magic 00000000 at 8
[  268.210441] vxfs: can't find superblock.
12:08:34 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:34 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:34 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r3 = perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x4, 0xe8, 0x80, 0x4, 0x0, 0x8, 0x410, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x4e47400000000000, 0x9a}, 0x11040, 0x8, 0x5, 0x1, 0x40, 0x0, 0xc71f, 0x0, 0x0, 0x0, 0x110c}, r1, 0x9, r4, 0x2)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_getsetattr(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x0, 0x2, 0x9}, &(0x7f0000000100))
r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r5, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r5, &(0x7f0000000040), 0x2)
r6 = signalfd(r3, &(0x7f0000000240)={[0xf3]}, 0x8)
sendfile(r5, r6, &(0x7f0000000280)=0x5, 0x31)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2)
vmsplice(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f00000002c0)="e72ef31a4db7ebbac6582640decd2231f2b5411403a23d8fc10eb0eae1b74e0b29c06e65a92d22ce6199ff9b2a5afbcc1b32b8904d4126051e9c7d17236d17b47bce4747195ecf988bf490a239049afeeba952a3ce131219720435aebdeb6cc0ccb2c31e66cb14f81f9bb90abeaa5746a7d8edc97f", 0x75}, {&(0x7f00000003c0)="5221b86fc66b9998cc317a6115c7fba951955333725f1fd75f88bb52e77a26a3942a44818ac3b21f369981af55e8981e9a4b2c8de45c5345e036fa0904724a9f8b9e57147f706342ee3fab9afc11927becfeae266c77f945", 0x58}, {&(0x7f0000000440)="c3a8a47fb6e4eaff35543dc3c9f4cfa9260261cb97a09aa2cb9e09e60e768c47829c8500595235f56c2758f5cb219efd01db22479f021deb4b159c094d16d429e5cd24287ae82bf90448cc06f0d82e86b4d427f320b4f11eee72a0", 0x5b}, {&(0x7f00000004c0)="a62755d4e1fc83a79f9ec4cc9b7f0d6544a3122c61f480c1eb2b8708c1daf5e9492f285e24a9683f409d1fb05941716e1630245803ea31dec59b4e84c3b3d38f59ab4bc3a02e3481eb4acbb534481b61ccf6218e13fdff44b93a97", 0x5b}, {&(0x7f0000000800)="80d77db7b74e87dc1cd5236c0534fb7e8328b5fea42472584fcfb1e53e5261ac80e6dbb9599bd800653ebbe25e1e28ad83f2e444de4d92a23cfde1bfc1eb369b91cb01b1a912b3dd3d36178fe92dc34ee75ab8eeb78012b88fc0253a2382788d61c75534d2c51ec297df028c669bed260d6b69951810113dfe", 0x79}, {&(0x7f00000005c0)="89f56de39532c5c134a63207c5629c4b92be40f61c7000edc0de1ee5b6aff59d5b610910e4b11735edcf43c45d601fe1bfffcad93165690eb9335de21a10c20bc4efa5c203f6aac852ab5997872e22ecd3eb3e37c123dc647ddf49df6fc165807cecd38b3427b02a33c79592ac408faf7c05d2cedd93fdbf5578e66e90cd81867526b101634d1a5d4463b4191c9bc2d05d057d07f54e1fc4d1161e20681166c6a509cefa692c7b59ccb8368bca54045fa329bf227832aaf91f25afd11f00f8c6a009756e545bdfadc38be7eaf55d", 0xce}, {&(0x7f00000006c0)="2d85ce68c34662c7700e5d2ed28a4a02494c9aad70150ad532a6b54cb904a7c5e73498c3fa48058abb5e3c5de30b8f71c3ee3307436672998b5ab1c89d91264ef958b0d2d5de5fbd4538aef3c311c3b709b785b57dccc395655ed4c9a0af2af19824d204b35b3d374f9bdb65f802eb7fc9e5d850beacebab3e34b63450052f331de571e4a1f4", 0x86}], 0x7, 0x2)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x81, 0x2, 0x2, 0x5, 0x0, 0xb36a, 0x12481, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x1000}, 0x0, 0x200, 0xfffffff9, 0xb, 0xc03, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}, 0xffffffffffffffff, 0xe, r0, 0x2)

12:08:34 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'][,,)@]$'}, {}, {}, {'\xe8\\+&'}, {']/'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:34 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
r2 = syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f00000016c0)=[{&(0x7f00000001c0)="48b6c10c41989ffdd733ae909a8cc3526218877bb78418933b38ff7be52b995a280b89db323fe343f16abbd88a32a07cd77bb600d9b875449a5b4b4168760c1901b5185da88f4f75ce4935383dd6af552f16f1630adce147e926551d49e48f5ffd1f4c2e68acdbfbba9efde6a226e51fdfc839942cf8e799077bdb7e3228f6a6e243d6d9ffaf499e3f6d1681e2956fc91ac96e110e72a8dddfb7ba089199f80f60c4ae7ba72786f643d54450d00978aa3cd14ea8ea3553ac07aa0bb66d61026010d2e672cf632fd39990ea669f", 0xcd, 0x8}, {&(0x7f00000003c0)="a62022d6f80047877018f2de48167e9cdeedf9aafaf2809584653a34b78c9f5cbfddc85585707d090da9723b7775712935d46fedc0124f5da8ce0ac82d1034d84f1f2a3c16dba3f8f1b98dc4f5742f5bfde670d541510dfe7817a1f2c5d9a9107609c4fde3254430b54ff42c59d0aab08a3ee455f414f41e3834d8c1a7e0eec99f78656a24c4fbe1bfe58d99b926a350ecdfe6fa752df07be16a401d21f381530a77a80f6d705a0292b0786370d5bc2b637eda7433b39f89613be8f87656e8241dcf6d2dc351ed6aad5c2bf9e524db396114d2dabcc44b7c0b246349ad7cba46e4", 0xe1, 0x4bc4cf2d}, {&(0x7f00000004c0)="6973105b35d45bccab3f2e2b07def1745a2834f018a7768f372de6aa9da0f6175b1179dc9686172cafce3c53ad290086ccde47277ed5aa2133817feeccf1c8eaec727792a571e7017c768fa51a87ea8126393a46d6eb30e0bbc2442748141d448e0d85a6b41b0b0e7eb706c405912e9e3a0bad09c8cda473a06c5dd3cb7e5cba5c11ad8f668cb2f59007d5d3d10361a8eba2da43fce7d960bf6287c015a0cdc3a5095da2fa0a3817624258738b7b4ba9dffcd2ad1e0871f87a36ae2d6c610c049b452c7c5d8549", 0xc7, 0x8000000000000001}, {&(0x7f00000005c0)="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", 0x1000, 0x1f}, {&(0x7f00000002c0)="8c99be9e1cd9ab04d5d0622585f10bf395f2dd34ae5c3adeea51604eb02a2c28b25b4adb95d1", 0x26, 0x8000000000000000}, {&(0x7f00000015c0)="22479398f39ea60e9aa69c0c1a300faccd44e6f5feb1dbf6f729fa7b13fe70fa593bb09f2e520ba53f11a45e711a3e086c503faf8a6a70d9094fbb785e41fa88a87714a2217c9cb78372fcad4e3562f378ba941f9e3a94b08b95ad7a0418c726bd84b77a2ef9a4be554d33ffb0c3c531cc1eefe7dfd31912624d37caf52f7e7fc747cd6c642bdb752d99a866d2c73020534e5984ea1f40223e664a7fa9d6e10187dba1034af81928968f2b89beac627aa549797e4b6475fa26d820e5b82dda45cef96e3cda1ca91a365f4168ff2031bddb052ccb24149750c4bfd3c19d", 0xdd, 0xaf5}, {&(0x7f0000000300)="3c570d1cd7b57b01059c8abe640097", 0xf, 0x27dd}], 0x40, &(0x7f0000000340)={[{'&&(@'}, {'/dev/userio\x00'}], [{@fsname={'fsname', 0x3d, '/dev/userio\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]})
r3 = getuid() (async)
r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001980), 0x32900, 0x0)
perf_event_open$cgroup(&(0x7f0000001900)={0x3, 0x80, 0x4, 0xe7, 0xdb, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3e15, 0x2, @perf_bp={&(0x7f00000018c0), 0x4}, 0x5008, 0x80000001, 0x1, 0x8, 0x8000000000000000, 0x7b, 0xffff, 0x0, 0x2, 0x0, 0x1}, r4, 0xc, r0, 0x2) (async)
syz_mount_image$nfs(&(0x7f00000019c0), &(0x7f0000001a00)='./file1\x00', 0x0, 0x1, &(0x7f0000001a80)=[{&(0x7f0000001a40)="d271e49db63716ed278f205e", 0xc, 0x8000000000000000}], 0x100008, &(0x7f0000001ac0)={[{'(-'}, {}, {'access=any'}], [{@subj_user={'subj_user', 0x3d, 'xattr'}}]}) (async)
mount$cgroup(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='noprefix,release_agent?./file1,xattr,pcr=000000 0000000000063,fowner<', @ANYRESDEC=r3, @ANYBLOB=',smackfsroot=mpol,audit,obj_role=tmpfs\x00,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d5b242e2b0f2c66736d616769633d3078303030303030303030303030303030382c646f6e745f6d6561737572652c736d61636b6673666c6f6f723d3d72656c61746976652c00"])
mount$cgroup(0x0, 0x0, &(0x7f0000000340), 0x200000, &(0x7f00000004c0)={[{@noprefix}, {@noprefix}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@name={'name', 0x3d, '%&:^'}}, {@xattr}], [{@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio}]})
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xff}, 0x2) (async)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x4, &(0x7f0000001780)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@privport}, {@afid={'afid', 0x3d, 0x3}}, {@cachetag={'cachetag', 0x3d, '%\xc2-'}}, {@loose}, {@cache_fscache}, {@uname={'uname', 0x3d, '/dev/userio\x00'}}, {@access_any}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/userio\x00'}}, {@fowner_gt={'fowner>', 0xee01}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x6}}, {@uid_eq={'uid', 0x3d, r3}}, {@smackfsroot}]}})
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:34 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r2 = syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f00000016c0)=[{&(0x7f00000001c0)="48b6c10c41989ffdd733ae909a8cc3526218877bb78418933b38ff7be52b995a280b89db323fe343f16abbd88a32a07cd77bb600d9b875449a5b4b4168760c1901b5185da88f4f75ce4935383dd6af552f16f1630adce147e926551d49e48f5ffd1f4c2e68acdbfbba9efde6a226e51fdfc839942cf8e799077bdb7e3228f6a6e243d6d9ffaf499e3f6d1681e2956fc91ac96e110e72a8dddfb7ba089199f80f60c4ae7ba72786f643d54450d00978aa3cd14ea8ea3553ac07aa0bb66d61026010d2e672cf632fd39990ea669f", 0xcd, 0x8}, {&(0x7f00000003c0)="a62022d6f80047877018f2de48167e9cdeedf9aafaf2809584653a34b78c9f5cbfddc85585707d090da9723b7775712935d46fedc0124f5da8ce0ac82d1034d84f1f2a3c16dba3f8f1b98dc4f5742f5bfde670d541510dfe7817a1f2c5d9a9107609c4fde3254430b54ff42c59d0aab08a3ee455f414f41e3834d8c1a7e0eec99f78656a24c4fbe1bfe58d99b926a350ecdfe6fa752df07be16a401d21f381530a77a80f6d705a0292b0786370d5bc2b637eda7433b39f89613be8f87656e8241dcf6d2dc351ed6aad5c2bf9e524db396114d2dabcc44b7c0b246349ad7cba46e4", 0xe1, 0x4bc4cf2d}, {&(0x7f00000004c0)="6973105b35d45bccab3f2e2b07def1745a2834f018a7768f372de6aa9da0f6175b1179dc9686172cafce3c53ad290086ccde47277ed5aa2133817feeccf1c8eaec727792a571e7017c768fa51a87ea8126393a46d6eb30e0bbc2442748141d448e0d85a6b41b0b0e7eb706c405912e9e3a0bad09c8cda473a06c5dd3cb7e5cba5c11ad8f668cb2f59007d5d3d10361a8eba2da43fce7d960bf6287c015a0cdc3a5095da2fa0a3817624258738b7b4ba9dffcd2ad1e0871f87a36ae2d6c610c049b452c7c5d8549", 0xc7, 0x8000000000000001}, {&(0x7f00000005c0)="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", 0x1000, 0x1f}, {&(0x7f00000002c0)="8c99be9e1cd9ab04d5d0622585f10bf395f2dd34ae5c3adeea51604eb02a2c28b25b4adb95d1", 0x26, 0x8000000000000000}, {&(0x7f00000015c0)="22479398f39ea60e9aa69c0c1a300faccd44e6f5feb1dbf6f729fa7b13fe70fa593bb09f2e520ba53f11a45e711a3e086c503faf8a6a70d9094fbb785e41fa88a87714a2217c9cb78372fcad4e3562f378ba941f9e3a94b08b95ad7a0418c726bd84b77a2ef9a4be554d33ffb0c3c531cc1eefe7dfd31912624d37caf52f7e7fc747cd6c642bdb752d99a866d2c73020534e5984ea1f40223e664a7fa9d6e10187dba1034af81928968f2b89beac627aa549797e4b6475fa26d820e5b82dda45cef96e3cda1ca91a365f4168ff2031bddb052ccb24149750c4bfd3c19d", 0xdd, 0xaf5}, {&(0x7f0000000300)="3c570d1cd7b57b01059c8abe640097", 0xf, 0x27dd}], 0x40, &(0x7f0000000340)={[{'&&(@'}, {'/dev/userio\x00'}], [{@fsname={'fsname', 0x3d, '/dev/userio\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]})
r3 = getuid()
r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001980), 0x32900, 0x0)
perf_event_open$cgroup(&(0x7f0000001900)={0x3, 0x80, 0x4, 0xe7, 0xdb, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3e15, 0x2, @perf_bp={&(0x7f00000018c0), 0x4}, 0x5008, 0x80000001, 0x1, 0x8, 0x8000000000000000, 0x7b, 0xffff, 0x0, 0x2, 0x0, 0x1}, r4, 0xc, r0, 0x2)
syz_mount_image$nfs(&(0x7f00000019c0), &(0x7f0000001a00)='./file1\x00', 0x0, 0x1, &(0x7f0000001a80)=[{&(0x7f0000001a40)="d271e49db63716ed278f205e", 0xc, 0x8000000000000000}], 0x100008, &(0x7f0000001ac0)={[{'(-'}, {}, {'access=any'}], [{@subj_user={'subj_user', 0x3d, 'xattr'}}]})
mount$cgroup(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='noprefix,release_agent?./file1,xattr,pcr=000000 0000000000063,fowner<', @ANYRESDEC=r3, @ANYBLOB=',smackfsroot=mpol,audit,obj_role=tmpfs\x00,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d5b242e2b0f2c66736d616769633d3078303030303030303030303030303030382c646f6e745f6d6561737572652c736d61636b6673666c6f6f723d3d72656c61746976652c00"])
mount$cgroup(0x0, 0x0, &(0x7f0000000340), 0x200000, &(0x7f00000004c0)={[{@noprefix}, {@noprefix}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@name={'name', 0x3d, '%&:^'}}, {@xattr}], [{@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio}]})
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xff}, 0x2)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x4, &(0x7f0000001780)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@privport}, {@afid={'afid', 0x3d, 0x3}}, {@cachetag={'cachetag', 0x3d, '%\xc2-'}}, {@loose}, {@cache_fscache}, {@uname={'uname', 0x3d, '/dev/userio\x00'}}, {@access_any}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/userio\x00'}}, {@fowner_gt={'fowner>', 0xee01}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x6}}, {@uid_eq={'uid', 0x3d, r3}}, {@smackfsroot}]}})
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:34 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, <r1=>0x0, 0x0, <r2=>0x0}, 0x2020)
r3 = getuid()
mount$cgroup(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='noprefix,release_agent?./file1,xattr,pcr=000000 0000000000063,fowner<', @ANYRESDEC=r3, @ANYBLOB=',smackit,obj_role=tmpfs\x00,uid=\x00'/44, @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d5b242e2b0f2c66736d616769633d3078303030303030303030303030303030382c646f6e745f6d6561737572652c736d61636b6673666c6f6f723d3d72656c61746976652c00"])
mount$cgroup(0x0, 0x0, &(0x7f0000000340), 0x200000, &(0x7f00000004c0)={[{@noprefix}, {@noprefix}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@name={'name', 0x3d, '%&:^'}}, {@xattr}], [{@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio}]})
r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1c6}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000002400)=ANY=[@ANYBLOB="00fd544af46ddefea24e43beacff594bce7e87d7b27ea31a0c94979862f7663908188d789b364d7481bf8a0325d92af5129ec2aeb2f25e73d6e7824a613ca0fdfe33a8245c16b9d2c931342fd57ec1f8108376dcf0b6db66e896dd6c821c641ceaa5ab0101000000000000000000200000"])
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000002480)='./file0/file0\x00', 0x0, 0x4, &(0x7f00000027c0)=[{&(0x7f00000024c0)="55ff0b90121c053d1a5369a74c4096af960d571893b5e44ff586e85e5e8a10241d838466db2dfff8dfb53ce876f0c31494a66c73de98a660f830bd7e7bf22b6f948157bfa1b09e4b38fa8e6d9d32526684c940b63b282d0e5dcc0458a4c992cd32a93adba530294a2f0ab560993d33", 0x6f, 0xff}, {&(0x7f0000002540)="956155b5d5dd8b24bbeea53b9760e2046cc588ef901ef21b2c5add5cd5ce29618fd8ce0709ef139f0bc303f2ee101fa1acca742dfd21065e33c76869c438d68f91c494f08bf4a8caafcdd9e2f4c3a548a78f866c3e504b09e6dcbef0f4f689a729f92551e802b07323a15414cbecdfd05571b835d7a6ffc5cacc2a50e4d6fb022b10a19dd6b375e4533fca8d995b7f3c0b1e1354a9cd1088cecfc9e0726f70c0eb4a9f5dedf31061a4ed8d97fcb4f2f9a0f3aa575803cfefc05b0222f7079e5f5de64d1f913c97270343eada81916760e9399587d9142b75e43756e43084b66ba4189deaad4586", 0xe7, 0x6}, {&(0x7f0000002640)="69519ffa72bf3a7e67bb36990adfd32fda1ca8ec55e9a6108eec751ffea44a1fe67245baa7c83b6220a08d0beb5247a3ce97644ff3c04b68e219863afaf3f21dd7f35ee323c274e7eeb6ed4f82aff1485bed2033a226aba03b12f2ca5fcb8152b072c6de3816af15f7cda3dac2ec81b771583b05025d53c19bad46b3ad6899460a8c0b3a2bc54fe636599880b70ee7941d14ff2af07a2ee72976a2bb8206b6cd0591e0f67d23ba3bcf5f89ff85006ad31bb5754850e28939a6b6ac8290a080ef36c4f3e2b1d965a5e13a1191ed5feb046714c2dd9a37e257", 0xd8, 0x7}, {&(0x7f0000002740)="92a5e46f5e7f0c84ec8090efa87ca6cc47657f4f0188fb3c3b838075f0c8680036c1d0bf0dbfea2b43f41d7b1f85a9a9ae285fd78859d1494ba2853fbb00e60cd328bad1e4d5", 0x46, 0x1}], 0x800c, &(0x7f0000002840)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0xfffffffffffffffa}}, {@fat=@nfs_nostale_ro}, {@fat=@gid={'gid', 0x3d, r2}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@nodots}], [{@dont_hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]})
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={<r7=>0x0}, &(0x7f0000000580)=0xc)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, r7, 0x0, r4, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r8=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r8, 0x0)
fchown(r4, 0xee01, r8)
write$FUSE_CREATE_OPEN(r0, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x1, 0x3, 0xc19, 0xfe66, 0x2, 0x100, {0x1, 0x9, 0xe0, 0x9, 0x2, 0x7, 0x7, 0x2, 0x8, 0xc000, 0x7, r3, r8, 0x1ff, 0x5}}, {0x0, 0x8}}}, 0xa0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r9 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r9, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  268.439725] vxfs: WRONG superblock magic 00000000 at 1
[  268.446537] vxfs: WRONG superblock magic 00000000 at 1
[  268.452117] vxfs: WRONG superblock magic 00000000 at 8
[  268.452298] vxfs: WRONG superblock magic 00000000 at 8
[  268.463284] vxfs: can't find superblock.
[  268.478169] vxfs: can't find superblock.
12:08:34 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'][,,)@]$'}, {}, {}, {'\xe8\\+&'}, {']/'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:34 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, <r1=>0x0, 0x0, <r2=>0x0}, 0x2020)
r3 = getuid()
mount$cgroup(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='noprefix,release_agent?./file1,xattr,pcr=000000 0000000000063,fowner<', @ANYRESDEC=r3, @ANYBLOB=',smackit,obj_role=tmpfs\x00,uid=\x00'/44, @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d5b242e2b0f2c66736d616769633d3078303030303030303030303030303030382c646f6e745f6d6561737572652c736d61636b6673666c6f6f723d3d72656c61746976652c00"])
mount$cgroup(0x0, 0x0, &(0x7f0000000340), 0x200000, &(0x7f00000004c0)={[{@noprefix}, {@noprefix}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@name={'name', 0x3d, '%&:^'}}, {@xattr}], [{@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio}]})
r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1c6}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000002400)=ANY=[@ANYBLOB="00fd544af46ddefea24e43beacff594bce7e87d7b27ea31a0c94979862f7663908188d789b364d7481bf8a0325d92af5129ec2aeb2f25e73d6e7824a613ca0fdfe33a8245c16b9d2c931342fd57ec1f8108376dcf0b6db66e896dd6c821c641ceaa5ab0101000000000000000000200000"])
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000002480)='./file0/file0\x00', 0x0, 0x4, &(0x7f00000027c0)=[{&(0x7f00000024c0)="55ff0b90121c053d1a5369a74c4096af960d571893b5e44ff586e85e5e8a10241d838466db2dfff8dfb53ce876f0c31494a66c73de98a660f830bd7e7bf22b6f948157bfa1b09e4b38fa8e6d9d32526684c940b63b282d0e5dcc0458a4c992cd32a93adba530294a2f0ab560993d33", 0x6f, 0xff}, {&(0x7f0000002540)="956155b5d5dd8b24bbeea53b9760e2046cc588ef901ef21b2c5add5cd5ce29618fd8ce0709ef139f0bc303f2ee101fa1acca742dfd21065e33c76869c438d68f91c494f08bf4a8caafcdd9e2f4c3a548a78f866c3e504b09e6dcbef0f4f689a729f92551e802b07323a15414cbecdfd05571b835d7a6ffc5cacc2a50e4d6fb022b10a19dd6b375e4533fca8d995b7f3c0b1e1354a9cd1088cecfc9e0726f70c0eb4a9f5dedf31061a4ed8d97fcb4f2f9a0f3aa575803cfefc05b0222f7079e5f5de64d1f913c97270343eada81916760e9399587d9142b75e43756e43084b66ba4189deaad4586", 0xe7, 0x6}, {&(0x7f0000002640)="69519ffa72bf3a7e67bb36990adfd32fda1ca8ec55e9a6108eec751ffea44a1fe67245baa7c83b6220a08d0beb5247a3ce97644ff3c04b68e219863afaf3f21dd7f35ee323c274e7eeb6ed4f82aff1485bed2033a226aba03b12f2ca5fcb8152b072c6de3816af15f7cda3dac2ec81b771583b05025d53c19bad46b3ad6899460a8c0b3a2bc54fe636599880b70ee7941d14ff2af07a2ee72976a2bb8206b6cd0591e0f67d23ba3bcf5f89ff85006ad31bb5754850e28939a6b6ac8290a080ef36c4f3e2b1d965a5e13a1191ed5feb046714c2dd9a37e257", 0xd8, 0x7}, {&(0x7f0000002740)="92a5e46f5e7f0c84ec8090efa87ca6cc47657f4f0188fb3c3b838075f0c8680036c1d0bf0dbfea2b43f41d7b1f85a9a9ae285fd78859d1494ba2853fbb00e60cd328bad1e4d5", 0x46, 0x1}], 0x800c, &(0x7f0000002840)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0xfffffffffffffffa}}, {@fat=@nfs_nostale_ro}, {@fat=@gid={'gid', 0x3d, r2}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@nodots}], [{@dont_hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]})
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={<r7=>0x0}, &(0x7f0000000580)=0xc)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, r7, 0x0, r4, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r8=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r8, 0x0)
fchown(r4, 0xee01, r8)
write$FUSE_CREATE_OPEN(r0, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x1, 0x3, 0xc19, 0xfe66, 0x2, 0x100, {0x1, 0x9, 0xe0, 0x9, 0x2, 0x7, 0x7, 0x2, 0x8, 0xc000, 0x7, r3, r8, 0x1ff, 0x5}}, {0x0, 0x8}}}, 0xa0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r9 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r9, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  268.491453] MTD: Attempt to mount non-MTD device "/dev/loop3"
12:08:34 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  268.539381] vxfs: WRONG superblock magic 00000000 at 1
[  268.557816] vxfs: WRONG superblock magic 00000000 at 8
[  268.563352] romfs: VFS: Can't find a romfs filesystem on dev loop3.
[  268.587811] 9pnet: Insufficient options for proto=fd
[  268.606806] vxfs: can't find superblock.
[  268.627825] vxfs: WRONG superblock magic 00000000 at 1
[  268.633451] vxfs: WRONG superblock magic 00000000 at 8
[  268.641794] vxfs: can't find superblock.
12:08:35 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180))
r2 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', <r3=>0x0})
sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_delneigh={0x1c, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}}, 0x1c}}, 0x0)
sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x64, 0x10, 0x2, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, 0x40088, 0x2000}, [@IFLA_GROUP={0x8, 0x1b, 0x40}, @IFLA_MAP={0x24, 0xe, {0x4b6, 0x5, 0x4, 0x1, 0x5, 0x67}}, @IFLA_CARRIER={0x5, 0x21, 0x2}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x683e0}, @IFLA_EXT_MASK={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008041}, 0x4080000)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:35 executing program 1:
ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000018c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r0=>0x0}})
ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000b40)={0x0, 0x0, {0x7, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, @struct={0x0, 0x2}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1]}, {0x0, @usage, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @usage=0x9f0, 0x0, 0x0, [0x4, 0x0, 0x0, 0x8]}, {0x0, @struct={0x8000, 0x20}, 0x0, 0x0, 0x400, 0x9, 0x80000000, 0x0, 0x22, @usage, 0x0, 0xb2, [0x0, 0x8, 0x7]}, {0x0, 0x1}})
ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000480)={0x1, 0x0, {0x401, @usage=0x80000000, 0x0, 0x7f, 0x101, 0x8001, 0x1, 0x2, 0x20, @struct={0x0, 0x101}, 0x9, 0x3, [0x2, 0x2, 0x800, 0x9, 0xffffffff, 0x3]}, {0x2, @usage=0x8, 0x0, 0x100, 0xed, 0x200, 0x1, 0x1, 0x22, @usage=0x5, 0x6, 0x16, [0x3, 0x1cb, 0x745c, 0x3, 0x4, 0x5]}, {0x6, @struct={0x9, 0x5}, r0, 0x69b, 0xb0c, 0xfffffffffffffc01, 0x5, 0x10000, 0x4c0, @usage=0x8001, 0x800, 0xe19c, [0x7f, 0x2, 0xabf3, 0x1, 0x8000000000000000, 0x4]}, {0x7ff, 0x10000, 0x9}}) (async)
mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x2, 0x0)

12:08:35 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'][,,)@]$'}, {}, {}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:35 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, <r1=>0x0, 0x0, <r2=>0x0}, 0x2020)
r3 = getuid()
mount$cgroup(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='noprefix,release_agent?./file1,xattr,pcr=000000 0000000000063,fowner<', @ANYRESDEC=r3, @ANYBLOB=',smackit,obj_role=tmpfs\x00,uid=\x00'/44, @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d5b242e2b0f2c66736d616769633d3078303030303030303030303030303030382c646f6e745f6d6561737572652c736d61636b6673666c6f6f723d3d72656c61746976652c00"])
mount$cgroup(0x0, 0x0, &(0x7f0000000340), 0x200000, &(0x7f00000004c0)={[{@noprefix}, {@noprefix}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@name={'name', 0x3d, '%&:^'}}, {@xattr}], [{@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio}]})
r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1c6}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000002400)=ANY=[@ANYBLOB="00fd544af46ddefea24e43beacff594bce7e87d7b27ea31a0c94979862f7663908188d789b364d7481bf8a0325d92af5129ec2aeb2f25e73d6e7824a613ca0fdfe33a8245c16b9d2c931342fd57ec1f8108376dcf0b6db66e896dd6c821c641ceaa5ab0101000000000000000000200000"])
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000002480)='./file0/file0\x00', 0x0, 0x4, &(0x7f00000027c0)=[{&(0x7f00000024c0)="55ff0b90121c053d1a5369a74c4096af960d571893b5e44ff586e85e5e8a10241d838466db2dfff8dfb53ce876f0c31494a66c73de98a660f830bd7e7bf22b6f948157bfa1b09e4b38fa8e6d9d32526684c940b63b282d0e5dcc0458a4c992cd32a93adba530294a2f0ab560993d33", 0x6f, 0xff}, {&(0x7f0000002540)="956155b5d5dd8b24bbeea53b9760e2046cc588ef901ef21b2c5add5cd5ce29618fd8ce0709ef139f0bc303f2ee101fa1acca742dfd21065e33c76869c438d68f91c494f08bf4a8caafcdd9e2f4c3a548a78f866c3e504b09e6dcbef0f4f689a729f92551e802b07323a15414cbecdfd05571b835d7a6ffc5cacc2a50e4d6fb022b10a19dd6b375e4533fca8d995b7f3c0b1e1354a9cd1088cecfc9e0726f70c0eb4a9f5dedf31061a4ed8d97fcb4f2f9a0f3aa575803cfefc05b0222f7079e5f5de64d1f913c97270343eada81916760e9399587d9142b75e43756e43084b66ba4189deaad4586", 0xe7, 0x6}, {&(0x7f0000002640)="69519ffa72bf3a7e67bb36990adfd32fda1ca8ec55e9a6108eec751ffea44a1fe67245baa7c83b6220a08d0beb5247a3ce97644ff3c04b68e219863afaf3f21dd7f35ee323c274e7eeb6ed4f82aff1485bed2033a226aba03b12f2ca5fcb8152b072c6de3816af15f7cda3dac2ec81b771583b05025d53c19bad46b3ad6899460a8c0b3a2bc54fe636599880b70ee7941d14ff2af07a2ee72976a2bb8206b6cd0591e0f67d23ba3bcf5f89ff85006ad31bb5754850e28939a6b6ac8290a080ef36c4f3e2b1d965a5e13a1191ed5feb046714c2dd9a37e257", 0xd8, 0x7}, {&(0x7f0000002740)="92a5e46f5e7f0c84ec8090efa87ca6cc47657f4f0188fb3c3b838075f0c8680036c1d0bf0dbfea2b43f41d7b1f85a9a9ae285fd78859d1494ba2853fbb00e60cd328bad1e4d5", 0x46, 0x1}], 0x800c, &(0x7f0000002840)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0xfffffffffffffffa}}, {@fat=@nfs_nostale_ro}, {@fat=@gid={'gid', 0x3d, r2}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@nodots}], [{@dont_hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]})
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={<r7=>0x0}, &(0x7f0000000580)=0xc)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, r7, 0x0, r4, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r8=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r8, 0x0)
fchown(r4, 0xee01, r8)
write$FUSE_CREATE_OPEN(r0, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x1, 0x3, 0xc19, 0xfe66, 0x2, 0x100, {0x1, 0x9, 0xe0, 0x9, 0x2, 0x7, 0x7, 0x2, 0x8, 0xc000, 0x7, r3, r8, 0x1ff, 0x5}}, {0x0, 0x8}}}, 0xa0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r9 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r9, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:35 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) (async, rerun: 32)
r1 = gettid() (rerun: 32)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r3 = perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9) (async)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc020660b, &(0x7f0000000140)) (async, rerun: 64)
perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x4, 0xe8, 0x80, 0x4, 0x0, 0x8, 0x410, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x4e47400000000000, 0x9a}, 0x11040, 0x8, 0x5, 0x1, 0x40, 0x0, 0xc71f, 0x0, 0x0, 0x0, 0x110c}, r1, 0x9, r4, 0x2) (async, rerun: 64)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
mq_getsetattr(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x0, 0x2, 0x9}, &(0x7f0000000100)) (async, rerun: 32)
r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (rerun: 32)
write$USERIO_CMD_SET_PORT_TYPE(r5, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r5, &(0x7f0000000040), 0x2) (async)
r6 = signalfd(r3, &(0x7f0000000240)={[0xf3]}, 0x8)
sendfile(r5, r6, &(0x7f0000000280)=0x5, 0x31)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2)
vmsplice(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f00000002c0)="e72ef31a4db7ebbac6582640decd2231f2b5411403a23d8fc10eb0eae1b74e0b29c06e65a92d22ce6199ff9b2a5afbcc1b32b8904d4126051e9c7d17236d17b47bce4747195ecf988bf490a239049afeeba952a3ce131219720435aebdeb6cc0ccb2c31e66cb14f81f9bb90abeaa5746a7d8edc97f", 0x75}, {&(0x7f00000003c0)="5221b86fc66b9998cc317a6115c7fba951955333725f1fd75f88bb52e77a26a3942a44818ac3b21f369981af55e8981e9a4b2c8de45c5345e036fa0904724a9f8b9e57147f706342ee3fab9afc11927becfeae266c77f945", 0x58}, {&(0x7f0000000440)="c3a8a47fb6e4eaff35543dc3c9f4cfa9260261cb97a09aa2cb9e09e60e768c47829c8500595235f56c2758f5cb219efd01db22479f021deb4b159c094d16d429e5cd24287ae82bf90448cc06f0d82e86b4d427f320b4f11eee72a0", 0x5b}, {&(0x7f00000004c0)="a62755d4e1fc83a79f9ec4cc9b7f0d6544a3122c61f480c1eb2b8708c1daf5e9492f285e24a9683f409d1fb05941716e1630245803ea31dec59b4e84c3b3d38f59ab4bc3a02e3481eb4acbb534481b61ccf6218e13fdff44b93a97", 0x5b}, {&(0x7f0000000800)="80d77db7b74e87dc1cd5236c0534fb7e8328b5fea42472584fcfb1e53e5261ac80e6dbb9599bd800653ebbe25e1e28ad83f2e444de4d92a23cfde1bfc1eb369b91cb01b1a912b3dd3d36178fe92dc34ee75ab8eeb78012b88fc0253a2382788d61c75534d2c51ec297df028c669bed260d6b69951810113dfe", 0x79}, {&(0x7f00000005c0)="89f56de39532c5c134a63207c5629c4b92be40f61c7000edc0de1ee5b6aff59d5b610910e4b11735edcf43c45d601fe1bfffcad93165690eb9335de21a10c20bc4efa5c203f6aac852ab5997872e22ecd3eb3e37c123dc647ddf49df6fc165807cecd38b3427b02a33c79592ac408faf7c05d2cedd93fdbf5578e66e90cd81867526b101634d1a5d4463b4191c9bc2d05d057d07f54e1fc4d1161e20681166c6a509cefa692c7b59ccb8368bca54045fa329bf227832aaf91f25afd11f00f8c6a009756e545bdfadc38be7eaf55d", 0xce}, {&(0x7f00000006c0)="2d85ce68c34662c7700e5d2ed28a4a02494c9aad70150ad532a6b54cb904a7c5e73498c3fa48058abb5e3c5de30b8f71c3ee3307436672998b5ab1c89d91264ef958b0d2d5de5fbd4538aef3c311c3b709b785b57dccc395655ed4c9a0af2af19824d204b35b3d374f9bdb65f802eb7fc9e5d850beacebab3e34b63450052f331de571e4a1f4", 0x86}], 0x7, 0x2)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x81, 0x2, 0x2, 0x5, 0x0, 0xb36a, 0x12481, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x1000}, 0x0, 0x200, 0xfffffff9, 0xb, 0xc03, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}, 0xffffffffffffffff, 0xe, r0, 0x2)

12:08:35 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  269.127904] PF_BRIDGE: RTM_DELNEIGH with invalid address
[  269.164040] vxfs: WRONG superblock magic 00000000 at 1
[  269.168315] vxfs: WRONG superblock magic 00000000 at 1
12:08:35 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r3 = perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x4, 0xe8, 0x80, 0x4, 0x0, 0x8, 0x410, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x4e47400000000000, 0x9a}, 0x11040, 0x8, 0x5, 0x1, 0x40, 0x0, 0xc71f, 0x0, 0x0, 0x0, 0x110c}, r1, 0x9, r4, 0x2)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_getsetattr(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x0, 0x2, 0x9}, &(0x7f0000000100))
r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r5, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r5, &(0x7f0000000040), 0x2)
r6 = signalfd(r3, &(0x7f0000000240)={[0xf3]}, 0x8)
sendfile(r5, r6, &(0x7f0000000280)=0x5, 0x31)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2)
vmsplice(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f00000002c0)="e72ef31a4db7ebbac6582640decd2231f2b5411403a23d8fc10eb0eae1b74e0b29c06e65a92d22ce6199ff9b2a5afbcc1b32b8904d4126051e9c7d17236d17b47bce4747195ecf988bf490a239049afeeba952a3ce131219720435aebdeb6cc0ccb2c31e66cb14f81f9bb90abeaa5746a7d8edc97f", 0x75}, {&(0x7f00000003c0)="5221b86fc66b9998cc317a6115c7fba951955333725f1fd75f88bb52e77a26a3942a44818ac3b21f369981af55e8981e9a4b2c8de45c5345e036fa0904724a9f8b9e57147f706342ee3fab9afc11927becfeae266c77f945", 0x58}, {&(0x7f0000000440)="c3a8a47fb6e4eaff35543dc3c9f4cfa9260261cb97a09aa2cb9e09e60e768c47829c8500595235f56c2758f5cb219efd01db22479f021deb4b159c094d16d429e5cd24287ae82bf90448cc06f0d82e86b4d427f320b4f11eee72a0", 0x5b}, {&(0x7f00000004c0)="a62755d4e1fc83a79f9ec4cc9b7f0d6544a3122c61f480c1eb2b8708c1daf5e9492f285e24a9683f409d1fb05941716e1630245803ea31dec59b4e84c3b3d38f59ab4bc3a02e3481eb4acbb534481b61ccf6218e13fdff44b93a97", 0x5b}, {&(0x7f0000000800)="80d77db7b74e87dc1cd5236c0534fb7e8328b5fea42472584fcfb1e53e5261ac80e6dbb9599bd800653ebbe25e1e28ad83f2e444de4d92a23cfde1bfc1eb369b91cb01b1a912b3dd3d36178fe92dc34ee75ab8eeb78012b88fc0253a2382788d61c75534d2c51ec297df028c669bed260d6b69951810113dfe", 0x79}, {&(0x7f00000005c0)="89f56de39532c5c134a63207c5629c4b92be40f61c7000edc0de1ee5b6aff59d5b610910e4b11735edcf43c45d601fe1bfffcad93165690eb9335de21a10c20bc4efa5c203f6aac852ab5997872e22ecd3eb3e37c123dc647ddf49df6fc165807cecd38b3427b02a33c79592ac408faf7c05d2cedd93fdbf5578e66e90cd81867526b101634d1a5d4463b4191c9bc2d05d057d07f54e1fc4d1161e20681166c6a509cefa692c7b59ccb8368bca54045fa329bf227832aaf91f25afd11f00f8c6a009756e545bdfadc38be7eaf55d", 0xce}, {&(0x7f00000006c0)="2d85ce68c34662c7700e5d2ed28a4a02494c9aad70150ad532a6b54cb904a7c5e73498c3fa48058abb5e3c5de30b8f71c3ee3307436672998b5ab1c89d91264ef958b0d2d5de5fbd4538aef3c311c3b709b785b57dccc395655ed4c9a0af2af19824d204b35b3d374f9bdb65f802eb7fc9e5d850beacebab3e34b63450052f331de571e4a1f4", 0x86}], 0x7, 0x2)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x81, 0x2, 0x2, 0x5, 0x0, 0xb36a, 0x12481, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x1000}, 0x0, 0x200, 0xfffffff9, 0xb, 0xc03, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}, 0xffffffffffffffff, 0xe, r0, 0x2)

12:08:35 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) (async, rerun: 32)
r2 = socket$nl_route(0x10, 0x3, 0x0) (rerun: 32)
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', <r3=>0x0})
sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_delneigh={0x1c, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}}, 0x1c}}, 0x0) (async, rerun: 32)
sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x64, 0x10, 0x2, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, 0x40088, 0x2000}, [@IFLA_GROUP={0x8, 0x1b, 0x40}, @IFLA_MAP={0x24, 0xe, {0x4b6, 0x5, 0x4, 0x1, 0x5, 0x67}}, @IFLA_CARRIER={0x5, 0x21, 0x2}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x683e0}, @IFLA_EXT_MASK={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008041}, 0x4080000) (async, rerun: 32)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:35 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) (async)
r2 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', <r3=>0x0})
sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_delneigh={0x1c, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}}, 0x1c}}, 0x0) (async)
sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x64, 0x10, 0x2, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, 0x40088, 0x2000}, [@IFLA_GROUP={0x8, 0x1b, 0x40}, @IFLA_MAP={0x24, 0xe, {0x4b6, 0x5, 0x4, 0x1, 0x5, 0x67}}, @IFLA_CARRIER={0x5, 0x21, 0x2}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x683e0}, @IFLA_EXT_MASK={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008041}, 0x4080000) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:35 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'][,,)@]$'}, {}, {}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  269.186463] vxfs: WRONG superblock magic 00000000 at 8
[  269.192032] vxfs: WRONG superblock magic 00000000 at 8
[  269.209059] vxfs: can't find superblock.
[  269.211702] vxfs: can't find superblock.
12:08:35 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000001ec0)=[{{&(0x7f00000001c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000240)=""/102, 0x66}, {&(0x7f00000002c0)=""/52, 0x34}, {&(0x7f0000000300)=""/99, 0x63}, {&(0x7f00000003c0)=""/187, 0xbb}, {&(0x7f0000000480)=""/131, 0x83}, {&(0x7f0000000540)=""/243, 0xf3}, {&(0x7f0000000640)=""/185, 0xb9}, {&(0x7f0000000700)=""/149, 0x95}], 0x8, &(0x7f0000000840)=""/12, 0xc}, 0x3}, {{&(0x7f0000000880)=@generic, 0x80, &(0x7f0000000a00)=[{&(0x7f0000001fc0)=""/103, 0x67}, {&(0x7f0000000980)=""/21, 0x15}, {&(0x7f00000009c0)=""/25, 0x19}], 0x3, &(0x7f0000000a40)=""/6, 0x6}, 0xff}, {{&(0x7f0000000a80)=@ax25={{0x3, @rose}, [@bcast, @remote, @null, @remote, @null, @bcast, @remote, @null]}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/56, 0x38}, {&(0x7f0000000c40)=""/108, 0x6c}, {&(0x7f0000000900)=""/77, 0x4d}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/40, 0x28}, {&(0x7f0000001d80)=""/12, 0xc}], 0x7, &(0x7f0000001e40)=""/114, 0x72}, 0xfffffffc}], 0x3, 0x40000000, &(0x7f0000001f80))
perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x7, 0x9b, 0x5, 0x4c, 0x0, 0x4, 0x30204, 0x7, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x500, 0x3, 0x80000001, 0x4, 0x3, 0x10000, 0x8c00, 0x0, 0x3a4, 0x0, 0xff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000cc0)={0x1, 0x80, 0x7, 0x81, 0xc4, 0x3, 0x0, 0xa84, 0x300, 0x227d0a4d2af3b3be, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x33e, 0x0, @perf_config_ext={0xb246, 0x5}, 0x8400, 0x401, 0xff, 0x2, 0x7, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0xa)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:35 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  269.264196] PF_BRIDGE: RTM_DELNEIGH with invalid address
12:08:35 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000001ec0)=[{{&(0x7f00000001c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000240)=""/102, 0x66}, {&(0x7f00000002c0)=""/52, 0x34}, {&(0x7f0000000300)=""/99, 0x63}, {&(0x7f00000003c0)=""/187, 0xbb}, {&(0x7f0000000480)=""/131, 0x83}, {&(0x7f0000000540)=""/243, 0xf3}, {&(0x7f0000000640)=""/185, 0xb9}, {&(0x7f0000000700)=""/149, 0x95}], 0x8, &(0x7f0000000840)=""/12, 0xc}, 0x3}, {{&(0x7f0000000880)=@generic, 0x80, &(0x7f0000000a00)=[{&(0x7f0000001fc0)=""/103, 0x67}, {&(0x7f0000000980)=""/21, 0x15}, {&(0x7f00000009c0)=""/25, 0x19}], 0x3, &(0x7f0000000a40)=""/6, 0x6}, 0xff}, {{&(0x7f0000000a80)=@ax25={{0x3, @rose}, [@bcast, @remote, @null, @remote, @null, @bcast, @remote, @null]}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/56, 0x38}, {&(0x7f0000000c40)=""/108, 0x6c}, {&(0x7f0000000900)=""/77, 0x4d}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/40, 0x28}, {&(0x7f0000001d80)=""/12, 0xc}], 0x7, &(0x7f0000001e40)=""/114, 0x72}, 0xfffffffc}], 0x3, 0x40000000, &(0x7f0000001f80))
perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x7, 0x9b, 0x5, 0x4c, 0x0, 0x4, 0x30204, 0x7, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x500, 0x3, 0x80000001, 0x4, 0x3, 0x10000, 0x8c00, 0x0, 0x3a4, 0x0, 0xff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000cc0)={0x1, 0x80, 0x7, 0x81, 0xc4, 0x3, 0x0, 0xa84, 0x300, 0x227d0a4d2af3b3be, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x33e, 0x0, @perf_config_ext={0xb246, 0x5}, 0x8400, 0x401, 0xff, 0x2, 0x7, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0xa)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
recvmmsg(0xffffffffffffffff, &(0x7f0000001ec0)=[{{&(0x7f00000001c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000240)=""/102, 0x66}, {&(0x7f00000002c0)=""/52, 0x34}, {&(0x7f0000000300)=""/99, 0x63}, {&(0x7f00000003c0)=""/187, 0xbb}, {&(0x7f0000000480)=""/131, 0x83}, {&(0x7f0000000540)=""/243, 0xf3}, {&(0x7f0000000640)=""/185, 0xb9}, {&(0x7f0000000700)=""/149, 0x95}], 0x8, &(0x7f0000000840)=""/12, 0xc}, 0x3}, {{&(0x7f0000000880)=@generic, 0x80, &(0x7f0000000a00)=[{&(0x7f0000001fc0)=""/103, 0x67}, {&(0x7f0000000980)=""/21, 0x15}, {&(0x7f00000009c0)=""/25, 0x19}], 0x3, &(0x7f0000000a40)=""/6, 0x6}, 0xff}, {{&(0x7f0000000a80)=@ax25={{0x3, @rose}, [@bcast, @remote, @null, @remote, @null, @bcast, @remote, @null]}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/56, 0x38}, {&(0x7f0000000c40)=""/108, 0x6c}, {&(0x7f0000000900)=""/77, 0x4d}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/40, 0x28}, {&(0x7f0000001d80)=""/12, 0xc}], 0x7, &(0x7f0000001e40)=""/114, 0x72}, 0xfffffffc}], 0x3, 0x40000000, &(0x7f0000001f80)) (async)
perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x7, 0x9b, 0x5, 0x4c, 0x0, 0x4, 0x30204, 0x7, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x500, 0x3, 0x80000001, 0x4, 0x3, 0x10000, 0x8c00, 0x0, 0x3a4, 0x0, 0xff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async)
perf_event_open(&(0x7f0000000cc0)={0x1, 0x80, 0x7, 0x81, 0xc4, 0x3, 0x0, 0xa84, 0x300, 0x227d0a4d2af3b3be, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x33e, 0x0, @perf_config_ext={0xb246, 0x5}, 0x8400, 0x401, 0xff, 0x2, 0x7, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

12:08:35 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async, rerun: 64)
recvmmsg(0xffffffffffffffff, &(0x7f0000001ec0)=[{{&(0x7f00000001c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000240)=""/102, 0x66}, {&(0x7f00000002c0)=""/52, 0x34}, {&(0x7f0000000300)=""/99, 0x63}, {&(0x7f00000003c0)=""/187, 0xbb}, {&(0x7f0000000480)=""/131, 0x83}, {&(0x7f0000000540)=""/243, 0xf3}, {&(0x7f0000000640)=""/185, 0xb9}, {&(0x7f0000000700)=""/149, 0x95}], 0x8, &(0x7f0000000840)=""/12, 0xc}, 0x3}, {{&(0x7f0000000880)=@generic, 0x80, &(0x7f0000000a00)=[{&(0x7f0000001fc0)=""/103, 0x67}, {&(0x7f0000000980)=""/21, 0x15}, {&(0x7f00000009c0)=""/25, 0x19}], 0x3, &(0x7f0000000a40)=""/6, 0x6}, 0xff}, {{&(0x7f0000000a80)=@ax25={{0x3, @rose}, [@bcast, @remote, @null, @remote, @null, @bcast, @remote, @null]}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/56, 0x38}, {&(0x7f0000000c40)=""/108, 0x6c}, {&(0x7f0000000900)=""/77, 0x4d}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/40, 0x28}, {&(0x7f0000001d80)=""/12, 0xc}], 0x7, &(0x7f0000001e40)=""/114, 0x72}, 0xfffffffc}], 0x3, 0x40000000, &(0x7f0000001f80)) (async, rerun: 64)
perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x7, 0x9b, 0x5, 0x4c, 0x0, 0x4, 0x30204, 0x7, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x500, 0x3, 0x80000001, 0x4, 0x3, 0x10000, 0x8c00, 0x0, 0x3a4, 0x0, 0xff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000cc0)={0x1, 0x80, 0x7, 0x81, 0xc4, 0x3, 0x0, 0xa84, 0x300, 0x227d0a4d2af3b3be, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x33e, 0x0, @perf_config_ext={0xb246, 0x5}, 0x8400, 0x401, 0xff, 0x2, 0x7, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  269.314450] vxfs: WRONG superblock magic 00000000 at 1
[  269.328021] vxfs: WRONG superblock magic 00000000 at 8
[  269.338939] vxfs: WRONG superblock magic 00000000 at 1
[  269.347476] vxfs: WRONG superblock magic 00000000 at 8
[  269.348271] vxfs: can't find superblock.
[  269.352870] vxfs: can't find superblock.
12:08:36 executing program 1:
ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000018c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r0=>0x0}})
ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000b40)={0x0, 0x0, {0x7, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, @struct={0x0, 0x2}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1]}, {0x0, @usage, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @usage=0x9f0, 0x0, 0x0, [0x4, 0x0, 0x0, 0x8]}, {0x0, @struct={0x8000, 0x20}, 0x0, 0x0, 0x400, 0x9, 0x80000000, 0x0, 0x22, @usage, 0x0, 0xb2, [0x0, 0x8, 0x7]}, {0x0, 0x1}}) (async)
ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000480)={0x1, 0x0, {0x401, @usage=0x80000000, 0x0, 0x7f, 0x101, 0x8001, 0x1, 0x2, 0x20, @struct={0x0, 0x101}, 0x9, 0x3, [0x2, 0x2, 0x800, 0x9, 0xffffffff, 0x3]}, {0x2, @usage=0x8, 0x0, 0x100, 0xed, 0x200, 0x1, 0x1, 0x22, @usage=0x5, 0x6, 0x16, [0x3, 0x1cb, 0x745c, 0x3, 0x4, 0x5]}, {0x6, @struct={0x9, 0x5}, r0, 0x69b, 0xb0c, 0xfffffffffffffc01, 0x5, 0x10000, 0x4c0, @usage=0x8001, 0x800, 0xe19c, [0x7f, 0x2, 0xabf3, 0x1, 0x8000000000000000, 0x4]}, {0x7ff, 0x10000, 0x9}}) (async)
mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x2, 0x0)

12:08:36 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:36 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'][,,)@]$'}, {}, {}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:36 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) (async)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r3 = perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb) (async)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x4, 0xe8, 0x80, 0x4, 0x0, 0x8, 0x410, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x4e47400000000000, 0x9a}, 0x11040, 0x8, 0x5, 0x1, 0x40, 0x0, 0xc71f, 0x0, 0x0, 0x0, 0x110c}, r1, 0x9, r4, 0x2) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
mq_getsetattr(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x0, 0x2, 0x9}, &(0x7f0000000100)) (async)
r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r5, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r5, &(0x7f0000000040), 0x2) (async)
r6 = signalfd(r3, &(0x7f0000000240)={[0xf3]}, 0x8)
sendfile(r5, r6, &(0x7f0000000280)=0x5, 0x31) (async)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2) (async)
vmsplice(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f00000002c0)="e72ef31a4db7ebbac6582640decd2231f2b5411403a23d8fc10eb0eae1b74e0b29c06e65a92d22ce6199ff9b2a5afbcc1b32b8904d4126051e9c7d17236d17b47bce4747195ecf988bf490a239049afeeba952a3ce131219720435aebdeb6cc0ccb2c31e66cb14f81f9bb90abeaa5746a7d8edc97f", 0x75}, {&(0x7f00000003c0)="5221b86fc66b9998cc317a6115c7fba951955333725f1fd75f88bb52e77a26a3942a44818ac3b21f369981af55e8981e9a4b2c8de45c5345e036fa0904724a9f8b9e57147f706342ee3fab9afc11927becfeae266c77f945", 0x58}, {&(0x7f0000000440)="c3a8a47fb6e4eaff35543dc3c9f4cfa9260261cb97a09aa2cb9e09e60e768c47829c8500595235f56c2758f5cb219efd01db22479f021deb4b159c094d16d429e5cd24287ae82bf90448cc06f0d82e86b4d427f320b4f11eee72a0", 0x5b}, {&(0x7f00000004c0)="a62755d4e1fc83a79f9ec4cc9b7f0d6544a3122c61f480c1eb2b8708c1daf5e9492f285e24a9683f409d1fb05941716e1630245803ea31dec59b4e84c3b3d38f59ab4bc3a02e3481eb4acbb534481b61ccf6218e13fdff44b93a97", 0x5b}, {&(0x7f0000000800)="80d77db7b74e87dc1cd5236c0534fb7e8328b5fea42472584fcfb1e53e5261ac80e6dbb9599bd800653ebbe25e1e28ad83f2e444de4d92a23cfde1bfc1eb369b91cb01b1a912b3dd3d36178fe92dc34ee75ab8eeb78012b88fc0253a2382788d61c75534d2c51ec297df028c669bed260d6b69951810113dfe", 0x79}, {&(0x7f00000005c0)="89f56de39532c5c134a63207c5629c4b92be40f61c7000edc0de1ee5b6aff59d5b610910e4b11735edcf43c45d601fe1bfffcad93165690eb9335de21a10c20bc4efa5c203f6aac852ab5997872e22ecd3eb3e37c123dc647ddf49df6fc165807cecd38b3427b02a33c79592ac408faf7c05d2cedd93fdbf5578e66e90cd81867526b101634d1a5d4463b4191c9bc2d05d057d07f54e1fc4d1161e20681166c6a509cefa692c7b59ccb8368bca54045fa329bf227832aaf91f25afd11f00f8c6a009756e545bdfadc38be7eaf55d", 0xce}, {&(0x7f00000006c0)="2d85ce68c34662c7700e5d2ed28a4a02494c9aad70150ad532a6b54cb904a7c5e73498c3fa48058abb5e3c5de30b8f71c3ee3307436672998b5ab1c89d91264ef958b0d2d5de5fbd4538aef3c311c3b709b785b57dccc395655ed4c9a0af2af19824d204b35b3d374f9bdb65f802eb7fc9e5d850beacebab3e34b63450052f331de571e4a1f4", 0x86}], 0x7, 0x2)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x81, 0x2, 0x2, 0x5, 0x0, 0xb36a, 0x12481, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x1000}, 0x0, 0x200, 0xfffffff9, 0xb, 0xc03, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}, 0xffffffffffffffff, 0xe, r0, 0x2)

12:08:36 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, <r1=>0x0, 0x0, <r2=>0x0}, 0x2020)
r3 = getuid()
mount$cgroup(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='noprefix,release_agent?./file1,xattr,pcr=000000 0000000000063,fowner<', @ANYRESDEC=r3, @ANYBLOB=',smackit,obj_role=tmpfs\x00,uid=\x00'/44, @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d5b242e2b0f2c66736d616769633d3078303030303030303030303030303030382c646f6e745f6d6561737572652c736d61636b6673666c6f6f723d3d72656c61746976652c00"])
mount$cgroup(0x0, 0x0, &(0x7f0000000340), 0x200000, &(0x7f00000004c0)={[{@noprefix}, {@noprefix}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@name={'name', 0x3d, '%&:^'}}, {@xattr}], [{@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio}]})
r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1c6}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000002400)=ANY=[@ANYBLOB="00fd544af46ddefea24e43beacff594bce7e87d7b27ea31a0c94979862f7663908188d789b364d7481bf8a0325d92af5129ec2aeb2f25e73d6e7824a613ca0fdfe33a8245c16b9d2c931342fd57ec1f8108376dcf0b6db66e896dd6c821c641ceaa5ab0101000000000000000000200000"])
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000002480)='./file0/file0\x00', 0x0, 0x4, &(0x7f00000027c0)=[{&(0x7f00000024c0)="55ff0b90121c053d1a5369a74c4096af960d571893b5e44ff586e85e5e8a10241d838466db2dfff8dfb53ce876f0c31494a66c73de98a660f830bd7e7bf22b6f948157bfa1b09e4b38fa8e6d9d32526684c940b63b282d0e5dcc0458a4c992cd32a93adba530294a2f0ab560993d33", 0x6f, 0xff}, {&(0x7f0000002540)="956155b5d5dd8b24bbeea53b9760e2046cc588ef901ef21b2c5add5cd5ce29618fd8ce0709ef139f0bc303f2ee101fa1acca742dfd21065e33c76869c438d68f91c494f08bf4a8caafcdd9e2f4c3a548a78f866c3e504b09e6dcbef0f4f689a729f92551e802b07323a15414cbecdfd05571b835d7a6ffc5cacc2a50e4d6fb022b10a19dd6b375e4533fca8d995b7f3c0b1e1354a9cd1088cecfc9e0726f70c0eb4a9f5dedf31061a4ed8d97fcb4f2f9a0f3aa575803cfefc05b0222f7079e5f5de64d1f913c97270343eada81916760e9399587d9142b75e43756e43084b66ba4189deaad4586", 0xe7, 0x6}, {&(0x7f0000002640)="69519ffa72bf3a7e67bb36990adfd32fda1ca8ec55e9a6108eec751ffea44a1fe67245baa7c83b6220a08d0beb5247a3ce97644ff3c04b68e219863afaf3f21dd7f35ee323c274e7eeb6ed4f82aff1485bed2033a226aba03b12f2ca5fcb8152b072c6de3816af15f7cda3dac2ec81b771583b05025d53c19bad46b3ad6899460a8c0b3a2bc54fe636599880b70ee7941d14ff2af07a2ee72976a2bb8206b6cd0591e0f67d23ba3bcf5f89ff85006ad31bb5754850e28939a6b6ac8290a080ef36c4f3e2b1d965a5e13a1191ed5feb046714c2dd9a37e257", 0xd8, 0x7}, {&(0x7f0000002740)="92a5e46f5e7f0c84ec8090efa87ca6cc47657f4f0188fb3c3b838075f0c8680036c1d0bf0dbfea2b43f41d7b1f85a9a9ae285fd78859d1494ba2853fbb00e60cd328bad1e4d5", 0x46, 0x1}], 0x800c, &(0x7f0000002840)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0xfffffffffffffffa}}, {@fat=@nfs_nostale_ro}, {@fat=@gid={'gid', 0x3d, r2}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@nodots}], [{@dont_hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]})
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={<r7=>0x0}, &(0x7f0000000580)=0xc)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, r7, 0x0, r4, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r8=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r8, 0x0)
fchown(r4, 0xee01, r8)
write$FUSE_CREATE_OPEN(r0, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x1, 0x3, 0xc19, 0xfe66, 0x2, 0x100, {0x1, 0x9, 0xe0, 0x9, 0x2, 0x7, 0x7, 0x2, 0x8, 0xc000, 0x7, r3, r8, 0x1ff, 0x5}}, {0x0, 0x8}}}, 0xa0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r9 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r9, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:36 executing program 3:
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=<r0=>0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, r0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:36 executing program 3:
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=<r0=>0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, r0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  270.037662] vxfs: WRONG superblock magic 00000000 at 1
[  270.039479] vxfs: WRONG superblock magic 00000000 at 1
[  270.053083] vxfs: WRONG superblock magic 00000000 at 8
[  270.064033] vxfs: can't find superblock.
[  270.066013] vxfs: WRONG superblock magic 00000000 at 8
[  270.077648] vxfs: can't find superblock.
12:08:36 executing program 3:
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=<r0=>0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, r0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) (async)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:36 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:36 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'][,,)@]$'}, {}, {}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:36 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x85ea)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:36 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, <r1=>0x0, 0x0, <r2=>0x0}, 0x2020)
r3 = getuid()
mount$cgroup(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='noprefix,release_agent?./file1,xattr,pcr=000000 0000000000063,fowner<', @ANYRESDEC=r3, @ANYBLOB=',smackit,obj_role=tmpfs\x00,uid=\x00'/44, @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d5b242e2b0f2c66736d616769633d3078303030303030303030303030303030382c646f6e745f6d6561737572652c736d61636b6673666c6f6f723d3d72656c61746976652c00"])
mount$cgroup(0x0, 0x0, &(0x7f0000000340), 0x200000, &(0x7f00000004c0)={[{@noprefix}, {@noprefix}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@name={'name', 0x3d, '%&:^'}}, {@xattr}], [{@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio}]})
r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1c6}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000002400)=ANY=[@ANYBLOB="00fd544af46ddefea24e43beacff594bce7e87d7b27ea31a0c94979862f7663908188d789b364d7481bf8a0325d92af5129ec2aeb2f25e73d6e7824a613ca0fdfe33a8245c16b9d2c931342fd57ec1f8108376dcf0b6db66e896dd6c821c641ceaa5ab0101000000000000000000200000"])
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000002480)='./file0/file0\x00', 0x0, 0x4, &(0x7f00000027c0)=[{&(0x7f00000024c0)="55ff0b90121c053d1a5369a74c4096af960d571893b5e44ff586e85e5e8a10241d838466db2dfff8dfb53ce876f0c31494a66c73de98a660f830bd7e7bf22b6f948157bfa1b09e4b38fa8e6d9d32526684c940b63b282d0e5dcc0458a4c992cd32a93adba530294a2f0ab560993d33", 0x6f, 0xff}, {&(0x7f0000002540)="956155b5d5dd8b24bbeea53b9760e2046cc588ef901ef21b2c5add5cd5ce29618fd8ce0709ef139f0bc303f2ee101fa1acca742dfd21065e33c76869c438d68f91c494f08bf4a8caafcdd9e2f4c3a548a78f866c3e504b09e6dcbef0f4f689a729f92551e802b07323a15414cbecdfd05571b835d7a6ffc5cacc2a50e4d6fb022b10a19dd6b375e4533fca8d995b7f3c0b1e1354a9cd1088cecfc9e0726f70c0eb4a9f5dedf31061a4ed8d97fcb4f2f9a0f3aa575803cfefc05b0222f7079e5f5de64d1f913c97270343eada81916760e9399587d9142b75e43756e43084b66ba4189deaad4586", 0xe7, 0x6}, {&(0x7f0000002640)="69519ffa72bf3a7e67bb36990adfd32fda1ca8ec55e9a6108eec751ffea44a1fe67245baa7c83b6220a08d0beb5247a3ce97644ff3c04b68e219863afaf3f21dd7f35ee323c274e7eeb6ed4f82aff1485bed2033a226aba03b12f2ca5fcb8152b072c6de3816af15f7cda3dac2ec81b771583b05025d53c19bad46b3ad6899460a8c0b3a2bc54fe636599880b70ee7941d14ff2af07a2ee72976a2bb8206b6cd0591e0f67d23ba3bcf5f89ff85006ad31bb5754850e28939a6b6ac8290a080ef36c4f3e2b1d965a5e13a1191ed5feb046714c2dd9a37e257", 0xd8, 0x7}, {&(0x7f0000002740)="92a5e46f5e7f0c84ec8090efa87ca6cc47657f4f0188fb3c3b838075f0c8680036c1d0bf0dbfea2b43f41d7b1f85a9a9ae285fd78859d1494ba2853fbb00e60cd328bad1e4d5", 0x46, 0x1}], 0x800c, &(0x7f0000002840)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0xfffffffffffffffa}}, {@fat=@nfs_nostale_ro}, {@fat=@gid={'gid', 0x3d, r2}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@nodots}], [{@dont_hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]})
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={<r7=>0x0}, &(0x7f0000000580)=0xc)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, r7, 0x0, r4, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r8=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r8, 0x0)
fchown(r4, 0xee01, r8)
write$FUSE_CREATE_OPEN(r0, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x1, 0x3, 0xc19, 0xfe66, 0x2, 0x100, {0x1, 0x9, 0xe0, 0x9, 0x2, 0x7, 0x7, 0x2, 0x8, 0xc000, 0x7, r3, r8, 0x1ff, 0x5}}, {0x0, 0x8}}}, 0xa0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r9 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r9, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  270.191064] vxfs: WRONG superblock magic 00000000 at 1
[  270.202201] vxfs: WRONG superblock magic 00000000 at 1
[  270.210436] vxfs: WRONG superblock magic 00000000 at 8
[  270.218146] vxfs: WRONG superblock magic 00000000 at 8
[  270.224529] vxfs: can't find superblock.
[  270.244920] vxfs: can't find superblock.
12:08:37 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000040), 0x0, 0x80001000, 0xfffffffa)

12:08:37 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x85ea)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:37 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, <r1=>0x0, 0x0, <r2=>0x0}, 0x2020)
r3 = getuid()
mount$cgroup(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='noprefix,release_agent?./file1,xattr,pcr=000000 0000000000063,fowner<', @ANYRESDEC=r3, @ANYBLOB=',smackit,obj_role=tmpfs\x00,uid=\x00'/44, @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d5b242e2b0f2c66736d616769633d3078303030303030303030303030303030382c646f6e745f6d6561737572652c736d61636b6673666c6f6f723d3d72656c61746976652c00"])
mount$cgroup(0x0, 0x0, &(0x7f0000000340), 0x200000, &(0x7f00000004c0)={[{@noprefix}, {@noprefix}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@name={'name', 0x3d, '%&:^'}}, {@xattr}], [{@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio}]})
r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1c6}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000002400)=ANY=[@ANYBLOB="00fd544af46ddefea24e43beacff594bce7e87d7b27ea31a0c94979862f7663908188d789b364d7481bf8a0325d92af5129ec2aeb2f25e73d6e7824a613ca0fdfe33a8245c16b9d2c931342fd57ec1f8108376dcf0b6db66e896dd6c821c641ceaa5ab0101000000000000000000200000"])
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000002480)='./file0/file0\x00', 0x0, 0x4, &(0x7f00000027c0)=[{&(0x7f00000024c0)="55ff0b90121c053d1a5369a74c4096af960d571893b5e44ff586e85e5e8a10241d838466db2dfff8dfb53ce876f0c31494a66c73de98a660f830bd7e7bf22b6f948157bfa1b09e4b38fa8e6d9d32526684c940b63b282d0e5dcc0458a4c992cd32a93adba530294a2f0ab560993d33", 0x6f, 0xff}, {&(0x7f0000002540)="956155b5d5dd8b24bbeea53b9760e2046cc588ef901ef21b2c5add5cd5ce29618fd8ce0709ef139f0bc303f2ee101fa1acca742dfd21065e33c76869c438d68f91c494f08bf4a8caafcdd9e2f4c3a548a78f866c3e504b09e6dcbef0f4f689a729f92551e802b07323a15414cbecdfd05571b835d7a6ffc5cacc2a50e4d6fb022b10a19dd6b375e4533fca8d995b7f3c0b1e1354a9cd1088cecfc9e0726f70c0eb4a9f5dedf31061a4ed8d97fcb4f2f9a0f3aa575803cfefc05b0222f7079e5f5de64d1f913c97270343eada81916760e9399587d9142b75e43756e43084b66ba4189deaad4586", 0xe7, 0x6}, {&(0x7f0000002640)="69519ffa72bf3a7e67bb36990adfd32fda1ca8ec55e9a6108eec751ffea44a1fe67245baa7c83b6220a08d0beb5247a3ce97644ff3c04b68e219863afaf3f21dd7f35ee323c274e7eeb6ed4f82aff1485bed2033a226aba03b12f2ca5fcb8152b072c6de3816af15f7cda3dac2ec81b771583b05025d53c19bad46b3ad6899460a8c0b3a2bc54fe636599880b70ee7941d14ff2af07a2ee72976a2bb8206b6cd0591e0f67d23ba3bcf5f89ff85006ad31bb5754850e28939a6b6ac8290a080ef36c4f3e2b1d965a5e13a1191ed5feb046714c2dd9a37e257", 0xd8, 0x7}, {&(0x7f0000002740)="92a5e46f5e7f0c84ec8090efa87ca6cc47657f4f0188fb3c3b838075f0c8680036c1d0bf0dbfea2b43f41d7b1f85a9a9ae285fd78859d1494ba2853fbb00e60cd328bad1e4d5", 0x46, 0x1}], 0x800c, &(0x7f0000002840)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0xfffffffffffffffa}}, {@fat=@nfs_nostale_ro}, {@fat=@gid={'gid', 0x3d, r2}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@nodots}], [{@dont_hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]})
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={<r7=>0x0}, &(0x7f0000000580)=0xc)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, r7, 0x0, r4, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r8=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r8, 0x0)
fchown(r4, 0xee01, r8)
write$FUSE_CREATE_OPEN(r0, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x1, 0x3, 0xc19, 0xfe66, 0x2, 0x100, {0x1, 0x9, 0xe0, 0x9, 0x2, 0x7, 0x7, 0x2, 0x8, 0xc000, 0x7, r3, r8, 0x1ff, 0x5}}, {0x0, 0x8}}}, 0xa0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r9 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r9, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:37 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'][,,)@]$'}, {}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:37 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}]})

12:08:37 executing program 5:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ca42, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x398}, 0x0, 0x5, 0xfffffffd, 0x0, 0xfffffffffffffffe, 0x4, 0xde}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
socket$inet(0x2, 0x1, 0x8001)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140))
clock_gettime(0x0, &(0x7f0000000080)={<r2=>0x0, <r3=>0x0})
mq_timedreceive(r1, &(0x7f0000000040)=""/57, 0x39, 0x8000000000000000, &(0x7f00000001c0)={r2, r3+10000000})
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0xd7, 0x6, 0x1, 0x0, 0x3d, 0x80a, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x1, @perf_bp={&(0x7f0000000000), 0xb}, 0xb12, 0xcc, 0x0, 0xb, 0xb7, 0x3, 0x5, 0x0, 0x4}, 0x0, 0x9, r0, 0xb)

12:08:37 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x85ea) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:37 executing program 5:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ca42, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x398}, 0x0, 0x5, 0xfffffffd, 0x0, 0xfffffffffffffffe, 0x4, 0xde}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async)
socket$inet(0x2, 0x1, 0x8001)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140))
clock_gettime(0x0, &(0x7f0000000080)={<r2=>0x0, <r3=>0x0})
mq_timedreceive(r1, &(0x7f0000000040)=""/57, 0x39, 0x8000000000000000, &(0x7f00000001c0)={r2, r3+10000000}) (async)
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0xd7, 0x6, 0x1, 0x0, 0x3d, 0x80a, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x1, @perf_bp={&(0x7f0000000000), 0xb}, 0xb12, 0xcc, 0x0, 0xb, 0xb7, 0x3, 0x5, 0x0, 0x4}, 0x0, 0x9, r0, 0xb)

[  270.879698] vxfs: WRONG superblock magic 00000000 at 1
[  270.893469] vxfs: WRONG superblock magic 00000000 at 8
12:08:37 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000040), 0x0, 0x80001000, 0xfffffffa)

12:08:37 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}]})

12:08:37 executing program 5:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ca42, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x398}, 0x0, 0x5, 0xfffffffd, 0x0, 0xfffffffffffffffe, 0x4, 0xde}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
socket$inet(0x2, 0x1, 0x8001)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async, rerun: 32)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (rerun: 32)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140)) (async, rerun: 64)
clock_gettime(0x0, &(0x7f0000000080)={<r2=>0x0, <r3=>0x0}) (rerun: 64)
mq_timedreceive(r1, &(0x7f0000000040)=""/57, 0x39, 0x8000000000000000, &(0x7f00000001c0)={r2, r3+10000000}) (async, rerun: 32)
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0xd7, 0x6, 0x1, 0x0, 0x3d, 0x80a, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x1, @perf_bp={&(0x7f0000000000), 0xb}, 0xb12, 0xcc, 0x0, 0xb, 0xb7, 0x3, 0x5, 0x0, 0x4}, 0x0, 0x9, r0, 0xb) (rerun: 32)

[  270.923745] vxfs: can't find superblock.
[  270.938393] vxfs: WRONG superblock magic 00000000 at 1
12:08:37 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x1f, 0x5, 0x7f, 0x0, 0x1f, 0x15108, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x7143, 0xfff}, 0x434b4, 0x8000, 0x4, 0x7, 0x5, 0x3, 0x400, 0x0, 0x1, 0x0, 0x64}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0x40}, 0x2)

12:08:37 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000040), 0x0, 0x80001000, 0xfffffffa)

12:08:37 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (fail_nth: 1)

[  270.986570] vxfs: WRONG superblock magic 00000000 at 8
[  270.999519] vxfs: can't find superblock.
12:08:37 executing program 0:
bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x1}, 0xc)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:37 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'][,,)@]$'}, {}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  271.053099] vxfs: WRONG superblock magic 00000000 at 1
[  271.067672] vxfs: WRONG superblock magic 00000000 at 8
12:08:37 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xc0000, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000040)={0x1, 0x4}, 0x2)

12:08:37 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  271.104102] vxfs: can't find superblock.
12:08:37 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:08:37 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}]})

12:08:37 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'][,,)@]$'}, {}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:37 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  271.134774] vxfs: WRONG superblock magic 00000000 at 1
[  271.146389] vxfs: WRONG superblock magic 00000000 at 8
[  271.151682] vxfs: can't find superblock.
12:08:37 executing program 0:
bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x1}, 0xc) (async)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  271.244178] vxfs: WRONG superblock magic 00000000 at 1
[  271.245463] vxfs: WRONG superblock magic 00000000 at 1
[  271.259595] vxfs: WRONG superblock magic 00000000 at 8
[  271.260171] vxfs: WRONG superblock magic 00000000 at 8
[  271.271567] vxfs: can't find superblock.
[  271.275080] vxfs: can't find superblock.
12:08:37 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x1f, 0x5, 0x7f, 0x0, 0x1f, 0x15108, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x7143, 0xfff}, 0x434b4, 0x8000, 0x4, 0x7, 0x5, 0x3, 0x400, 0x0, 0x1, 0x0, 0x64}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0x40}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x1f, 0x5, 0x7f, 0x0, 0x1f, 0x15108, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x7143, 0xfff}, 0x434b4, 0x8000, 0x4, 0x7, 0x5, 0x3, 0x400, 0x0, 0x1, 0x0, 0x64}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0x40}, 0x2) (async)

12:08:37 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/61, 0x3d}, {&(0x7f00000000c0)=""/98, 0x62}, {&(0x7f0000000140)=""/120, 0x78}, {&(0x7f00000001c0)=""/188, 0xbc}, {&(0x7f0000000280)=""/236, 0xec}], 0x5, 0x2, 0x2)

12:08:37 executing program 0:
bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x1}, 0xc)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x1}, 0xc) (async)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)

12:08:37 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:37 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'][,,)@]$'}, {}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  271.550886] misc userio: Can't change port type on an already running userio instance
[  271.561620] misc userio: Begin command sent, but we're already running
[  271.564177] vxfs: WRONG superblock magic 00000000 at 1
[  271.581675] vxfs: WRONG superblock magic 00000000 at 1
[  271.585086] vxfs: WRONG superblock magic 00000000 at 8
[  271.589892] vxfs: WRONG superblock magic 00000000 at 8
[  271.602901] vxfs: can't find superblock.
[  271.603467] vxfs: can't find superblock.
12:08:38 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)
r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xc0000, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000040)={0x1, 0x4}, 0x2)

12:08:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/61, 0x3d}, {&(0x7f00000000c0)=""/98, 0x62}, {&(0x7f0000000140)=""/120, 0x78}, {&(0x7f00000001c0)=""/188, 0xbc}, {&(0x7f0000000280)=""/236, 0xec}], 0x5, 0x2, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/61, 0x3d}, {&(0x7f00000000c0)=""/98, 0x62}, {&(0x7f0000000140)=""/120, 0x78}, {&(0x7f00000001c0)=""/188, 0xbc}, {&(0x7f0000000280)=""/236, 0xec}], 0x5, 0x2, 0x2) (async)

12:08:38 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:38 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000140))
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:38 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:38 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x1f, 0x5, 0x7f, 0x0, 0x1f, 0x15108, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x7143, 0xfff}, 0x434b4, 0x8000, 0x4, 0x7, 0x5, 0x3, 0x400, 0x0, 0x1, 0x0, 0x64}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0x40}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x1f, 0x5, 0x7f, 0x0, 0x1f, 0x15108, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x7143, 0xfff}, 0x434b4, 0x8000, 0x4, 0x7, 0x5, 0x3, 0x400, 0x0, 0x1, 0x0, 0x64}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0x40}, 0x2) (async)

12:08:38 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async, rerun: 64)
r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xc0000, 0x0) (rerun: 64)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000040)={0x1, 0x4}, 0x2)

12:08:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/61, 0x3d}, {&(0x7f00000000c0)=""/98, 0x62}, {&(0x7f0000000140)=""/120, 0x78}, {&(0x7f00000001c0)=""/188, 0xbc}, {&(0x7f0000000280)=""/236, 0xec}], 0x5, 0x2, 0x2)

[  272.034023] vxfs: WRONG superblock magic 00000000 at 1
[  272.035882] misc userio: Can't change port type on an already running userio instance
[  272.049903] vxfs: WRONG superblock magic 00000000 at 8
[  272.058647] vxfs: WRONG superblock magic 00000000 at 1
12:08:38 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0) (rerun: 64)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000140)) (async)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) (async)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  272.079715] misc userio: Begin command sent, but we're already running
[  272.087716] vxfs: WRONG superblock magic 00000000 at 8
[  272.093917] vxfs: can't find superblock.
[  272.100273] vxfs: can't find superblock.
12:08:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x721a0ef2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x14}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r2 = dup2(r1, r0)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x6, 0x80, 0x0, 0xffffffff, 0x16, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x200, 0x4212, 0x1ff, 0x9, 0x800, 0x0, 0x3f, 0x0, 0xd01a, 0x0, 0x3}, 0xffffffffffffffff, 0x6, r2, 0x0)

12:08:38 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@appraise_type}, {@appraise_type}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:38 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}, {}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x721a0ef2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x14}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r2 = dup2(r1, r0)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x6, 0x80, 0x0, 0xffffffff, 0x16, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x200, 0x4212, 0x1ff, 0x9, 0x800, 0x0, 0x3f, 0x0, 0xd01a, 0x0, 0x3}, 0xffffffffffffffff, 0x6, r2, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x721a0ef2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x14}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
dup2(r1, r0) (async)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x6, 0x80, 0x0, 0xffffffff, 0x16, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x200, 0x4212, 0x1ff, 0x9, 0x800, 0x0, 0x3f, 0x0, 0xd01a, 0x0, 0x3}, 0xffffffffffffffff, 0x6, r2, 0x0) (async)

12:08:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x721a0ef2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x14}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r2 = dup2(r1, r0)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x6, 0x80, 0x0, 0xffffffff, 0x16, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x200, 0x4212, 0x1ff, 0x9, 0x800, 0x0, 0x3f, 0x0, 0xd01a, 0x0, 0x3}, 0xffffffffffffffff, 0x6, r2, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x721a0ef2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x14}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
dup2(r1, r0) (async)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x6, 0x80, 0x0, 0xffffffff, 0x16, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x200, 0x4212, 0x1ff, 0x9, 0x800, 0x0, 0x3f, 0x0, 0xd01a, 0x0, 0x3}, 0xffffffffffffffff, 0x6, r2, 0x0) (async)

12:08:38 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000140))
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) (async)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  272.228512] vxfs: WRONG superblock magic 00000000 at 1
[  272.238418] vxfs: WRONG superblock magic 00000000 at 1
[  272.243458] vxfs: WRONG superblock magic 00000000 at 8
[  272.256656] vxfs: can't find superblock.
[  272.260990] vxfs: WRONG superblock magic 00000000 at 8
[  272.267349] vxfs: can't find superblock.
12:08:38 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:38 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@appraise_type}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  272.357792] vxfs: WRONG superblock magic 00000000 at 1
[  272.365334] vxfs: WRONG superblock magic 00000000 at 8
[  272.375194] vxfs: can't find superblock.
[  272.401971] vxfs: WRONG superblock magic 00000000 at 1
12:08:38 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  272.440591] vxfs: WRONG superblock magic 00000000 at 8
[  272.450376] vxfs: can't find superblock.
12:08:39 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140))
ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={@private0, @private2, @remote, 0x20, 0x4, 0x6, 0x500, 0x4, 0x10200})
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:08:39 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1000, 0x0)
perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0x2, 0x20, 0x5, 0x0, 0x330, 0x80004, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x401, 0x5, 0x0, 0x3, 0xf3, 0x8, 0x0, 0x5, 0x0, 0x3}, r0, 0x6, 0xffffffffffffffff, 0xd)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:39 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}]})

12:08:39 executing program 3:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x11, 0x3e, 0x0, 0x2d, 0x0, 0x0, 0x10, 0x5, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8847, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x81, 0x101, 0x1, 0x2400000000000000, 0x2, 0x3ff, 0x0, 0x2, 0x0, 0x800000000000}, 0x0, 0x5, r0, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:39 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

12:08:39 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:39 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:08:39 executing program 3:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x11, 0x3e, 0x0, 0x2d, 0x0, 0x0, 0x10, 0x5, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8847, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x81, 0x101, 0x1, 0x2400000000000000, 0x2, 0x3ff, 0x0, 0x2, 0x0, 0x800000000000}, 0x0, 0x5, r0, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x11, 0x3e, 0x0, 0x2d, 0x0, 0x0, 0x10, 0x5, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8847, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x81, 0x101, 0x1, 0x2400000000000000, 0x2, 0x3ff, 0x0, 0x2, 0x0, 0x800000000000}, 0x0, 0x5, r0, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

[  272.958139] vxfs: WRONG superblock magic 00000000 at 1
[  272.979978] vxfs: WRONG superblock magic 00000000 at 8
[  272.984778] vxfs: WRONG superblock magic 00000000 at 1
[  272.999763] vxfs: WRONG superblock magic 00000000 at 8
12:08:39 executing program 3:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x11, 0x3e, 0x0, 0x2d, 0x0, 0x0, 0x10, 0x5, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8847, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x81, 0x101, 0x1, 0x2400000000000000, 0x2, 0x3ff, 0x0, 0x2, 0x0, 0x800000000000}, 0x0, 0x5, r0, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x11, 0x3e, 0x0, 0x2d, 0x0, 0x0, 0x10, 0x5, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8847, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x81, 0x101, 0x1, 0x2400000000000000, 0x2, 0x3ff, 0x0, 0x2, 0x0, 0x800000000000}, 0x0, 0x5, r0, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

12:08:39 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1000, 0x0)
perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0x2, 0x20, 0x5, 0x0, 0x330, 0x80004, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x401, 0x5, 0x0, 0x3, 0xf3, 0x8, 0x0, 0x5, 0x0, 0x3}, r0, 0x6, 0xffffffffffffffff, 0xd) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  273.008816] vxfs: can't find superblock.
[  273.013928] vxfs: can't find superblock.
12:08:39 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0)
r2 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x2, 0x9, 0x39, 0x6, 0x0, 0x7, 0x8c02, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x101}, 0x0, 0x1, 0x8, 0x7, 0xffffffffffff7fff, 0x5, 0xfffb, 0x0, 0x9, 0x0, 0x192}, 0x0, 0x8, r1, 0xa)
ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0)
r3 = dup2(r2, r2)
mq_timedsend(r3, &(0x7f0000000140)="4aef19a85bb88370aabf5971e395ff9742b035368149d6179f6f4c107817fe1c84957147f654d99a2f72bc2b72524ed786c0120dc81db070799ca28e6afe233156b1216fef8a82e44f376d8e86114b37cad2c3b8484211c77678707df8f9342d08937554b7c6f3934179c35929d35d906e1afb715e3233fa95cb8aa12ade7f4c82c891702e3b4ba1a2aa3cfaa716a07130cc50169170c960a3b673ef17bed4e53135fcab3745793b6cc31d59e99d732d300eec04cab6f093bd4bcfd3e7f6639ff9f9c9e7fb017745d747adbada2e8928a475b747d0bdd2c38088575374d6f3fa8b56b9120af77430ab35d45279313137c0", 0xf1, 0x1, &(0x7f0000000000)={0x0, 0x989680})

12:08:39 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}]})

[  273.132526] vxfs: WRONG superblock magic 00000000 at 1
[  273.143965] vxfs: WRONG superblock magic 00000000 at 8
[  273.155092] vxfs: can't find superblock.
12:08:40 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140))
ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={@private0, @private2, @remote, 0x20, 0x4, 0x6, 0x500, 0x4, 0x10200})
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140)) (async)
ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={@private0, @private2, @remote, 0x20, 0x4, 0x6, 0x500, 0x4, 0x10200}) (async)
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)

12:08:40 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 1)

12:08:40 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) (async)
r2 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x2, 0x9, 0x39, 0x6, 0x0, 0x7, 0x8c02, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x101}, 0x0, 0x1, 0x8, 0x7, 0xffffffffffff7fff, 0x5, 0xfffb, 0x0, 0x9, 0x0, 0x192}, 0x0, 0x8, r1, 0xa) (async)
ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) (async)
r3 = dup2(r2, r2)
mq_timedsend(r3, &(0x7f0000000140)="4aef19a85bb88370aabf5971e395ff9742b035368149d6179f6f4c107817fe1c84957147f654d99a2f72bc2b72524ed786c0120dc81db070799ca28e6afe233156b1216fef8a82e44f376d8e86114b37cad2c3b8484211c77678707df8f9342d08937554b7c6f3934179c35929d35d906e1afb715e3233fa95cb8aa12ade7f4c82c891702e3b4ba1a2aa3cfaa716a07130cc50169170c960a3b673ef17bed4e53135fcab3745793b6cc31d59e99d732d300eec04cab6f093bd4bcfd3e7f6639ff9f9c9e7fb017745d747adbada2e8928a475b747d0bdd2c38088575374d6f3fa8b56b9120af77430ab35d45279313137c0", 0xf1, 0x1, &(0x7f0000000000)={0x0, 0x989680})

12:08:40 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb8, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x8}, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:40 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '{.+:'}}]})

12:08:40 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1000, 0x0)
perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0x2, 0x20, 0x5, 0x0, 0x330, 0x80004, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x401, 0x5, 0x0, 0x3, 0xf3, 0x8, 0x0, 0x5, 0x0, 0x3}, r0, 0x6, 0xffffffffffffffff, 0xd) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  273.814843] FAULT_INJECTION: forcing a failure.
[  273.814843] name failslab, interval 1, probability 0, space 0, times 0
[  273.827645] CPU: 1 PID: 16593 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  273.835541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  273.844897] Call Trace:
[  273.847487]  dump_stack+0x1b2/0x281
[  273.851121]  should_fail.cold+0x10a/0x149
[  273.854127] vxfs: WRONG superblock magic 00000000 at 1
[  273.855278]  should_failslab+0xd6/0x130
[  273.855291]  __kmalloc+0x2c1/0x400
[  273.855301]  ? SyS_memfd_create+0xbc/0x3c0
[  273.855314]  SyS_memfd_create+0xbc/0x3c0
[  273.855323]  ? shmem_fcntl+0x120/0x120
[  273.855333]  ? __do_page_fault+0x159/0xad0
[  273.855342]  ? do_syscall_64+0x4c/0x640
[  273.855349]  ? shmem_fcntl+0x120/0x120
[  273.855359]  do_syscall_64+0x1d5/0x640
[  273.855372]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  273.855380] RIP: 0033:0x7faf49cab209
[  273.855387] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246
12:08:40 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb8, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x8}, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb8, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x8}, 0x2) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

12:08:40 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 2)

12:08:40 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb8, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x8}, 0x2) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  273.862952] vxfs: WRONG superblock magic 00000000 at 8
[  273.864609]  ORIG_RAX: 000000000000013f
[  273.864616] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cab209
[  273.864622] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007faf49d0429c
[  273.864627] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007faf486201d0
[  273.864633] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000
[  273.864639] R13: 0000000020005a00 R14: 0000000000000000 R15: 0000000020006080
12:08:40 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0)
r2 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x2, 0x9, 0x39, 0x6, 0x0, 0x7, 0x8c02, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x101}, 0x0, 0x1, 0x8, 0x7, 0xffffffffffff7fff, 0x5, 0xfffb, 0x0, 0x9, 0x0, 0x192}, 0x0, 0x8, r1, 0xa) (async)
ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) (async)
r3 = dup2(r2, r2)
mq_timedsend(r3, &(0x7f0000000140)="4aef19a85bb88370aabf5971e395ff9742b035368149d6179f6f4c107817fe1c84957147f654d99a2f72bc2b72524ed786c0120dc81db070799ca28e6afe233156b1216fef8a82e44f376d8e86114b37cad2c3b8484211c77678707df8f9342d08937554b7c6f3934179c35929d35d906e1afb715e3233fa95cb8aa12ade7f4c82c891702e3b4ba1a2aa3cfaa716a07130cc50169170c960a3b673ef17bed4e53135fcab3745793b6cc31d59e99d732d300eec04cab6f093bd4bcfd3e7f6639ff9f9c9e7fb017745d747adbada2e8928a475b747d0bdd2c38088575374d6f3fa8b56b9120af77430ab35d45279313137c0", 0xf1, 0x1, &(0x7f0000000000)={0x0, 0x989680})

[  273.977972] FAULT_INJECTION: forcing a failure.
[  273.977972] name failslab, interval 1, probability 0, space 0, times 0
[  274.000645] CPU: 0 PID: 16619 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  274.008550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  274.017912] Call Trace:
[  274.020504]  dump_stack+0x1b2/0x281
[  274.024136]  should_fail.cold+0x10a/0x149
12:08:40 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0)
close(r2)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  274.028289]  should_failslab+0xd6/0x130
[  274.032276]  kmem_cache_alloc+0x28e/0x3c0
[  274.036429]  __d_alloc+0x2a/0xa20
[  274.039970]  ? lock_downgrade+0x740/0x740
[  274.044122]  __shmem_file_setup.part.0+0xcb/0x3c0
[  274.048965]  ? shmem_create+0x30/0x30
[  274.052767]  ? __alloc_fd+0x1be/0x490
[  274.056571]  SyS_memfd_create+0x1fc/0x3c0
[  274.060718]  ? shmem_fcntl+0x120/0x120
[  274.064602]  ? __do_page_fault+0x159/0xad0
[  274.068846]  ? do_syscall_64+0x4c/0x640
[  274.072907]  ? shmem_fcntl+0x120/0x120
12:08:40 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x7fffffffffffffff)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x7fffffffffffffff)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/ram15', 0x20400, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000001c0)=0xfffffffffffffeff)

[  274.076802]  do_syscall_64+0x1d5/0x640
[  274.080692]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  274.085878] RIP: 0033:0x7faf49cab209
[  274.089669] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  274.097379] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cab209
[  274.104645] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007faf49d0429c
[  274.111912] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007faf486201d0
[  274.119184] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000
12:08:40 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140))
ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={@private0, @private2, @remote, 0x20, 0x4, 0x6, 0x500, 0x4, 0x10200}) (async)
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:08:40 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4)

12:08:40 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 3)

12:08:40 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x7fffffffffffffff)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x7fffffffffffffff)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/ram15', 0x20400, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000001c0)=0xfffffffffffffeff)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x7fffffffffffffff) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x7fffffffffffffff) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/ram15', 0x20400, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000001c0)=0xfffffffffffffeff) (async)

[  274.126449] R13: 0000000020005a00 R14: 0000000000000000 R15: 0000000020006080
[  274.136012] vxfs: can't find superblock.
12:08:40 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:40 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async, rerun: 64)
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) (rerun: 64)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4)

12:08:40 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0) (async)
r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0)
close(r2)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:40 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1)
r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000140)={0x2, 0x7f}, 0x2)
preadv(r2, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000001, 0x4010, r1, 0xe056000)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180)={0x2, 0x4}, 0x2)

[  274.223237] FAULT_INJECTION: forcing a failure.
[  274.223237] name failslab, interval 1, probability 0, space 0, times 0
[  274.265348] vxfs: WRONG superblock magic 00000000 at 1
[  274.270909] CPU: 0 PID: 16659 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  274.278787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  274.288140] Call Trace:
[  274.290728]  dump_stack+0x1b2/0x281
[  274.294359]  should_fail.cold+0x10a/0x149
[  274.298598]  should_failslab+0xd6/0x130
[  274.302575]  kmem_cache_alloc+0x28e/0x3c0
[  274.306714]  ? shmem_destroy_callback+0xa0/0xa0
[  274.311384]  shmem_alloc_inode+0x18/0x40
[  274.315438]  ? shmem_destroy_callback+0xa0/0xa0
[  274.320097]  alloc_inode+0x5d/0x170
[  274.323713]  new_inode+0x1d/0xf0
[  274.327067]  shmem_get_inode+0x8b/0x890
[  274.331032]  __shmem_file_setup.part.0+0x104/0x3c0
[  274.335949]  ? shmem_create+0x30/0x30
[  274.339826]  ? __alloc_fd+0x1be/0x490
[  274.343619]  SyS_memfd_create+0x1fc/0x3c0
[  274.347752]  ? shmem_fcntl+0x120/0x120
[  274.351628]  ? __do_page_fault+0x159/0xad0
[  274.355853]  ? do_syscall_64+0x4c/0x640
[  274.359808]  ? shmem_fcntl+0x120/0x120
[  274.363683]  do_syscall_64+0x1d5/0x640
[  274.367558]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  274.372730] RIP: 0033:0x7faf49cab209
[  274.376424] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  274.384115] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cab209
[  274.391366] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007faf49d0429c
[  274.398616] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007faf486201d0
[  274.405866] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000
12:08:40 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x7fffffffffffffff)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x7fffffffffffffff)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/ram15', 0x20400, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000001c0)=0xfffffffffffffeff)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x7fffffffffffffff) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x7fffffffffffffff) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/ram15', 0x20400, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000001c0)=0xfffffffffffffeff) (async)

[  274.413134] R13: 0000000020005a00 R14: 0000000000000000 R15: 0000000020006080
[  274.427481] vxfs: WRONG superblock magic 00000000 at 8
[  274.434124] vxfs: can't find superblock.
12:08:40 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0xe621, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x2, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:40 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 4)

12:08:40 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:40 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0)
close(r2)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) (async)
close(r2) (async)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)

12:08:40 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0xe621, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x2, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  274.530162] FAULT_INJECTION: forcing a failure.
[  274.530162] name failslab, interval 1, probability 0, space 0, times 0
[  274.563536] CPU: 0 PID: 16697 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  274.571438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  274.580791] Call Trace:
[  274.583377]  dump_stack+0x1b2/0x281
[  274.587020]  should_fail.cold+0x10a/0x149
[  274.591179]  should_failslab+0xd6/0x130
[  274.595158]  kmem_cache_alloc+0x28e/0x3c0
[  274.599314]  get_empty_filp+0x86/0x3f0
[  274.603203]  alloc_file+0x23/0x440
[  274.606743]  __shmem_file_setup.part.0+0x198/0x3c0
[  274.611658]  ? shmem_create+0x30/0x30
[  274.615442]  ? __alloc_fd+0x1be/0x490
[  274.619232]  SyS_memfd_create+0x1fc/0x3c0
[  274.623371]  ? shmem_fcntl+0x120/0x120
[  274.627246]  ? __do_page_fault+0x159/0xad0
[  274.631466]  ? do_syscall_64+0x4c/0x640
[  274.635422]  ? shmem_fcntl+0x120/0x120
[  274.639557]  do_syscall_64+0x1d5/0x640
[  274.643437]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  274.648608] RIP: 0033:0x7faf49cab209
[  274.652301] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  274.660006] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cab209
[  274.667273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007faf49d0429c
[  274.674535] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007faf486201d0
[  274.681790] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000
[  274.689043] R13: 0000000020005a00 R14: 0000000000000000 R15: 0000000020006080
[  274.709453] vxfs: WRONG superblock magic 00000000 at 1
[  274.721729] vxfs: WRONG superblock magic 00000000 at 8
12:08:41 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4)

12:08:41 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3f)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:41 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 5)

[  274.728567] vxfs: can't find superblock.
12:08:41 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:41 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0xe621, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x2, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  274.797848] FAULT_INJECTION: forcing a failure.
[  274.797848] name failslab, interval 1, probability 0, space 0, times 0
[  274.829128] CPU: 0 PID: 16723 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  274.837036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  274.846386] Call Trace:
[  274.848970]  dump_stack+0x1b2/0x281
[  274.852600]  should_fail.cold+0x10a/0x149
[  274.856753]  should_failslab+0xd6/0x130
[  274.860732]  kmem_cache_alloc_trace+0x29a/0x3d0
[  274.865413]  apparmor_file_alloc_security+0x129/0x800
[  274.870606]  security_file_alloc+0x66/0xa0
[  274.874837]  ? selinux_is_enabled+0x5/0x50
[  274.879075]  get_empty_filp+0x16b/0x3f0
[  274.883050]  alloc_file+0x23/0x440
[  274.886593]  __shmem_file_setup.part.0+0x198/0x3c0
[  274.891524]  ? shmem_create+0x30/0x30
[  274.895407]  ? __alloc_fd+0x1be/0x490
[  274.899224]  SyS_memfd_create+0x1fc/0x3c0
[  274.903378]  ? shmem_fcntl+0x120/0x120
[  274.907264]  ? __do_page_fault+0x159/0xad0
[  274.911492]  ? do_syscall_64+0x4c/0x640
[  274.915460]  ? shmem_fcntl+0x120/0x120
[  274.919326]  do_syscall_64+0x1d5/0x640
[  274.923205]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  274.928390] RIP: 0033:0x7faf49cab209
[  274.932091] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  274.939815] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cab209
[  274.947081] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007faf49d0429c
[  274.954336] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007faf486201d0
[  274.961588] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000
[  274.968843] R13: 0000000020005a00 R14: 0000000000000000 R15: 0000000020006080
[  274.982758] vxfs: WRONG superblock magic 00000000 at 1
[  274.991907] vxfs: WRONG superblock magic 00000000 at 8
[  275.003064] vxfs: can't find superblock.
12:08:41 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async, rerun: 32)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (rerun: 32)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) (async)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) (async)
r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async, rerun: 32)
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) (rerun: 32)
write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000140)={0x2, 0x7f}, 0x2) (async)
preadv(r2, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000001, 0x4010, r1, 0xe056000) (async)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180)={0x2, 0x4}, 0x2)

12:08:41 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
mq_timedsend(r0, &(0x7f00000000c0)="b73d358ca95c40a9917aaa38659cdd9ff78090ac35722a384bfe317058b029cd5cf8b0592d42be2c4b62121928ec577db0d238023beb15c0bd324b920776dad0d2a408203f83f54bf69db5bc48153fa4a02687d1de115916b022969e3a1c6990449e00925e20265c2d62901dff1e8a94bdd8ed76833090a78d4a9fc08da5db6b4433502e1eb74d54cb6cf176ede6ccbaad2d5a8f", 0x94, 0x5, &(0x7f0000000000)={0x77359400})

12:08:41 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000000060404, 0x0)

12:08:41 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 6)

12:08:41 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3f)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3f) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)

12:08:41 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:41 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) (async)
mq_timedsend(r0, &(0x7f00000000c0)="b73d358ca95c40a9917aaa38659cdd9ff78090ac35722a384bfe317058b029cd5cf8b0592d42be2c4b62121928ec577db0d238023beb15c0bd324b920776dad0d2a408203f83f54bf69db5bc48153fa4a02687d1de115916b022969e3a1c6990449e00925e20265c2d62901dff1e8a94bdd8ed76833090a78d4a9fc08da5db6b4433502e1eb74d54cb6cf176ede6ccbaad2d5a8f", 0x94, 0x5, &(0x7f0000000000)={0x77359400})

12:08:41 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000000060404, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000000060404, 0x0) (async)

[  275.172863] FAULT_INJECTION: forcing a failure.
[  275.172863] name failslab, interval 1, probability 0, space 0, times 0
[  275.193360] vxfs: WRONG superblock magic 00000000 at 1
[  275.211411] vxfs: WRONG superblock magic 00000000 at 8
[  275.230404] CPU: 1 PID: 16761 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  275.238302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  275.247656] Call Trace:
[  275.250234]  dump_stack+0x1b2/0x281
[  275.253855]  should_fail.cold+0x10a/0x149
[  275.257994]  should_failslab+0xd6/0x130
[  275.261969]  kmem_cache_alloc+0x28e/0x3c0
[  275.266101]  getname_flags+0xc8/0x550
[  275.269894]  do_sys_open+0x1ce/0x410
[  275.273596]  ? filp_open+0x60/0x60
[  275.277120]  ? SyS_pwrite64+0xca/0x140
[  275.280997]  ? do_syscall_64+0x4c/0x640
[  275.284956]  ? SyS_open+0x30/0x30
[  275.288398]  do_syscall_64+0x1d5/0x640
[  275.292278]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  275.297449] RIP: 0033:0x7faf49c5e124
[  275.301144] RSP: 002b:00007faf4861feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  275.308858] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49c5e124
[  275.316109] RDX: 0000000000000002 RSI: 00007faf4861ffe0 RDI: 00000000ffffff9c
[  275.323370] RBP: 00007faf4861ffe0 R08: 0000000000000000 R09: 00007faf486201d0
12:08:41 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) (async)
mq_timedsend(r0, &(0x7f00000000c0)="b73d358ca95c40a9917aaa38659cdd9ff78090ac35722a384bfe317058b029cd5cf8b0592d42be2c4b62121928ec577db0d238023beb15c0bd324b920776dad0d2a408203f83f54bf69db5bc48153fa4a02687d1de115916b022969e3a1c6990449e00925e20265c2d62901dff1e8a94bdd8ed76833090a78d4a9fc08da5db6b4433502e1eb74d54cb6cf176ede6ccbaad2d5a8f", 0x94, 0x5, &(0x7f0000000000)={0x77359400})

12:08:41 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32)
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3f) (async, rerun: 32)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:41 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000000060404, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000000060404, 0x0) (async)

12:08:41 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  275.330625] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[  275.337878] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  275.354209] vxfs: can't find superblock.
[  275.441031] vxfs: WRONG superblock magic 00000000 at 1
[  275.447556] vxfs: WRONG superblock magic 00000000 at 8
[  275.458288] vxfs: can't find superblock.
12:08:42 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) (async)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) (async)
r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000140)={0x2, 0x7f}, 0x2) (async)
preadv(r2, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000001, 0x4010, r1, 0xe056000) (async)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180)={0x2, 0x4}, 0x2)

12:08:42 executing program 3:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
pwritev2(r2, &(0x7f00000002c0)=[{&(0x7f0000000080)="33ce4fac33dc3bf8fc89a62a136f76fc4fd645e66ff8ec0b087e60c0703d657267753d119107ad74a7af6be9bc92bcb897854da90cc8554530e31797dfaa47d9fd28756f", 0x44}, {&(0x7f0000000140)="452a1ad5627c382933e21119e9858edd4b15dbda6bdd7b30688883d275cd12fbd08ccb151b98f7958d604ee36e330812e28b0655e6f9d766a277aaf4aeb450b031c4392d69fa55382df8aeeee8456ee5b863f0a7228ce1841eef951869445efd7aa105e961b1500c539d3c4c480ddc0babeeec427387c6804228e6273722c4bc422fb93a951b8aae", 0x88}, {&(0x7f0000000000)="1b2b5c825cf7522ac8af320b4f1bfc911d56e1ea041cec4eb379406abf08590ea6ed5f32", 0x24}, {&(0x7f0000000200)}, {&(0x7f0000000240)="f396553636748e2d99363b407e8b3d6b9412b7986d3958b5f059c3dda3f6e78bf60736e5bf48545dbed7a92202d9fd149ce0b3a3a9fb133b620c19191791aae914ca12dcd0a737b7f2dfe56c5fc3de7b412dfda4de5880047be014ad5f1f7b499e7da4", 0x63}], 0x5, 0x800, 0x10001, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2)
close(r1)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
close(r0)

12:08:42 executing program 5:
sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x3, 0x1, 0x201, 0x0, 0x0, {0xf, 0x0, 0x4}, [@CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x3}, @CTA_ID={0x8}, @CTA_LABELS_MASK={0x2c, 0x17, [0x3, 0xf6, 0x3, 0x6, 0x9, 0x0, 0x81, 0xd4e9, 0x101, 0x8000]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4801}, 0x8080)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
accept4(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, <r0=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000240)=0x80, 0x0)
sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, 0x4, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_CHAIN_COUNTERS={0x40, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x80000000}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xf0}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_HOOK={0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4)

12:08:42 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 7)

12:08:42 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x5, 0xa4, 0x1, 0x7e, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x288d, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x4800, 0x7, 0x9, 0x5, 0x9, 0x5b7, 0x6, 0x0, 0x80000001, 0x0, 0x8}, r1, 0x9, r0, 0x2)
io_setup(0x3f, &(0x7f0000000140)=<r3=>0x0)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:42 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  275.682942] FAULT_INJECTION: forcing a failure.
[  275.682942] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  275.694768] CPU: 0 PID: 16816 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  275.702649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  275.712001] Call Trace:
[  275.714591]  dump_stack+0x1b2/0x281
[  275.718216]  should_fail.cold+0x10a/0x149
[  275.722360]  __alloc_pages_nodemask+0x22c/0x2720
[  275.727107]  ? trace_hardirqs_on+0x10/0x10
[  275.731337]  ? static_obj+0x50/0x50
[  275.735039]  ? trace_hardirqs_on+0x10/0x10
[  275.739266]  ? __lock_acquire+0x5fc/0x3f20
[  275.743507]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  275.748350]  ? up_write+0x17/0x60
[  275.751798]  ? generic_file_write_iter+0x2f8/0x650
[  275.756718]  ? __fsnotify_inode_delete+0x20/0x20
[  275.761462]  ? iov_iter_init+0xa6/0x1c0
[  275.765434]  cache_grow_begin+0x91/0x700
[  275.769492]  ? fs_reclaim_release+0xd0/0x110
[  275.773896]  ? check_preemption_disabled+0x35/0x240
[  275.778903]  cache_alloc_refill+0x273/0x350
[  275.783221]  kmem_cache_alloc+0x333/0x3c0
[  275.787360]  getname_flags+0xc8/0x550
[  275.791159]  do_sys_open+0x1ce/0x410
[  275.794867]  ? filp_open+0x60/0x60
[  275.798505]  ? SyS_pwrite64+0xca/0x140
[  275.802385]  ? do_syscall_64+0x4c/0x640
[  275.806351]  ? SyS_open+0x30/0x30
[  275.809797]  do_syscall_64+0x1d5/0x640
[  275.813681]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  275.818861] RIP: 0033:0x7faf49c5e124
[  275.822571] RSP: 002b:00007faf4861feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  275.830273] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49c5e124
[  275.837539] RDX: 0000000000000002 RSI: 00007faf4861ffe0 RDI: 00000000ffffff9c
[  275.844809] RBP: 00007faf4861ffe0 R08: 0000000000000000 R09: 00007faf486201d0
[  275.852070] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[  275.859334] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  275.873818] vxfs: WRONG superblock magic 00000000 at 1
12:08:42 executing program 5:
sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x3, 0x1, 0x201, 0x0, 0x0, {0xf, 0x0, 0x4}, [@CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x3}, @CTA_ID={0x8}, @CTA_LABELS_MASK={0x2c, 0x17, [0x3, 0xf6, 0x3, 0x6, 0x9, 0x0, 0x81, 0xd4e9, 0x101, 0x8000]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4801}, 0x8080)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
accept4(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, <r0=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000240)=0x80, 0x0)
sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, 0x4, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_CHAIN_COUNTERS={0x40, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x80000000}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xf0}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_HOOK={0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4)
sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x3, 0x1, 0x201, 0x0, 0x0, {0xf, 0x0, 0x4}, [@CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x3}, @CTA_ID={0x8}, @CTA_LABELS_MASK={0x2c, 0x17, [0x3, 0xf6, 0x3, 0x6, 0x9, 0x0, 0x81, 0xd4e9, 0x101, 0x8000]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4801}, 0x8080) (async)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
accept4(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000240)=0x80, 0x0) (async)
sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, 0x4, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_CHAIN_COUNTERS={0x40, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x80000000}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xf0}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_HOOK={0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) (async)

12:08:42 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  275.880714] vxfs: WRONG superblock magic 00000000 at 8
[  275.890640] misc userio: Invalid payload size
[  275.896938] vxfs: can't find superblock.
12:08:42 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb) (async)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9) (async)
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x5, 0xa4, 0x1, 0x7e, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x288d, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x4800, 0x7, 0x9, 0x5, 0x9, 0x5b7, 0x6, 0x0, 0x80000001, 0x0, 0x8}, r1, 0x9, r0, 0x2) (async)
io_setup(0x3f, &(0x7f0000000140)=<r3=>0x0)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  275.959920] vxfs: WRONG superblock magic 00000000 at 1
[  275.975770] vxfs: WRONG superblock magic 00000000 at 8
[  275.990685] vxfs: can't find superblock.
[  276.001849] vxfs: WRONG superblock magic 00000000 at 1
12:08:42 executing program 5:
sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x3, 0x1, 0x201, 0x0, 0x0, {0xf, 0x0, 0x4}, [@CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x3}, @CTA_ID={0x8}, @CTA_LABELS_MASK={0x2c, 0x17, [0x3, 0xf6, 0x3, 0x6, 0x9, 0x0, 0x81, 0xd4e9, 0x101, 0x8000]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4801}, 0x8080) (async)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
accept4(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, <r0=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000240)=0x80, 0x0)
sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, 0x4, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_CHAIN_COUNTERS={0x40, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x80000000}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xf0}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_HOOK={0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4)

12:08:42 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 8)

12:08:42 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

[  276.015187] vxfs: WRONG superblock magic 00000000 at 8
[  276.021993] vxfs: can't find superblock.
[  276.072773] FAULT_INJECTION: forcing a failure.
[  276.072773] name failslab, interval 1, probability 0, space 0, times 0
[  276.084641] CPU: 1 PID: 16863 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  276.092649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  276.098187] vxfs: WRONG superblock magic 00000000 at 1
[  276.101987] Call Trace:
[  276.102004]  dump_stack+0x1b2/0x281
[  276.102018]  should_fail.cold+0x10a/0x149
[  276.102031]  should_failslab+0xd6/0x130
[  276.102045]  kmem_cache_alloc+0x28e/0x3c0
[  276.107691] vxfs: WRONG superblock magic 00000000 at 8
[  276.109882]  get_empty_filp+0x86/0x3f0
[  276.109895]  path_openat+0x84/0x2970
[  276.109910]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  276.109921]  ? path_lookupat+0x780/0x780
[  276.113608] vxfs: can't find superblock.
[  276.117655]  ? trace_hardirqs_on+0x10/0x10
[  276.117671]  do_filp_open+0x179/0x3c0
[  276.117680]  ? may_open_dev+0xe0/0xe0
[  276.117690]  ? __alloc_fd+0x1be/0x490
[  276.117702]  ? lock_downgrade+0x740/0x740
[  276.117713]  ? do_raw_spin_unlock+0x164/0x220
[  276.117731]  ? _raw_spin_unlock+0x29/0x40
[  276.117738]  ? __alloc_fd+0x1be/0x490
[  276.117752]  do_sys_open+0x296/0x410
[  276.117761]  ? filp_open+0x60/0x60
[  276.190986]  ? SyS_pwrite64+0xca/0x140
[  276.194866]  ? do_syscall_64+0x4c/0x640
[  276.198828]  ? SyS_open+0x30/0x30
[  276.202278]  do_syscall_64+0x1d5/0x640
[  276.206169]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  276.211345] RIP: 0033:0x7faf49c5e124
[  276.215039] RSP: 002b:00007faf4861feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  276.222733] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49c5e124
[  276.229994] RDX: 0000000000000002 RSI: 00007faf4861ffe0 RDI: 00000000ffffff9c
[  276.237253] RBP: 00007faf4861ffe0 R08: 0000000000000000 R09: 00007faf486201d0
[  276.244508] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[  276.251767] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
12:08:42 executing program 1:
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'ip6erspan0\x00', {0x2, 0x4e21, @multicast1}})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000000)=0x401)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, <r2=>r1, {0x4800}}, './file0\x00'})
r3 = syz_mount_image$ufs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0xead, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000240)="6fc4e8e54fdc23fa586ce2fa8a89ab032b0a530d84fd20e5a7d565cad22b7a323d70363dea7c34e6a4bac86ed089bb614ded1946faf7cf740c35f3e588cf3acee9664aedea36f6589546e3c07a11900961d3bc88a7e11ca17097524fdfe2b69dd4d2f001d75cd2b114b33f781b179d39ce048f95bdb5b7ef5714c4ef44b79747fb278809669c0a32dddfedf44fb5c579ce13f26ad416a647781a563df95f6191210acc3b927971caa44838211726621be6c4306c6e22a35797f4783377487c58eab4b4005ed902668f83a4e307211b4784e08591af7e68febabf4635aeed61af6e20bce95ef7b9", 0xe7, 0x6}, {&(0x7f0000000340)="b10f6e1002d0632a728b6a7849380a36c8e2284df5e50cf58b90ff5b3fadd36748f21d9e8b8cf52c889ac3561dbbd23ff559769e33ece64ebfdb58", 0x3b, 0x1}, {&(0x7f0000000380)="ea9e743b042c7ea79738f69afad0b97e0ad0d664073c61cd7cbf0a718a521ffe654d85f1", 0x24, 0x1}, {&(0x7f0000000480)="c669e7a949afd4c9b0eb8f8ec4b1e376eadf182d4a1607eff32b1e272499c0caf58b48cbc9499b07bd5e38793ca355980eabbf080e1a6986e461c29381128a810aaebc5f491d26ac74062c5222620734e9276c8def9498808aaf12cb4bc174f681144f5cdfb81341f5bdf2e61bf6b8271d102bb624a1d99490369c2610a06df89cb3c9114150d68e7f2990d8c5afdca6ef347799cfa4a6636399f365961db02283f06097945593c98df20c1d8cffba7c0ca058fb14dbd4061ebcb3d62becea73b9637ef214f56808c0a8413e", 0xcc, 0x8001}, {&(0x7f0000000580)="95dae27d10801625b201c27db1f6420d0bdacd5aa909ff2c3399c47a81c3f3c79519aa204d3db77bf98c7c6006b7", 0x2e, 0xee}], 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="66642f33002c28292c2f646538afa7acc96d71a7002c2c7365636c6162656c2c7375626a5f726f6c653d2f6465762f75736572696f002c66736d616769633d3078303030303030303030303030303033662c657569643e", @ANYRESDEC=0x0, @ANYBLOB="2c7375626a5f757365723d852c2c00"])
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f00000006c0)={0x0, 0x1, r3, 0x1ff, 0x80000})
r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r4, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

[  276.504269] Bluetooth: hci1 command 0x0406 tx timeout
[  276.509586] Bluetooth: hci3 command 0x0406 tx timeout
[  276.515588] Bluetooth: hci2 command 0x0406 tx timeout
[  276.520840] Bluetooth: hci0 command 0x0406 tx timeout
[  276.526901] Bluetooth: hci4 command 0x0406 tx timeout
[  276.551511] ufs: ufs was compiled with read-only support, can't be mounted as read-write
12:08:43 executing program 3:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2) (async, rerun: 64)
pwritev2(r2, &(0x7f00000002c0)=[{&(0x7f0000000080)="33ce4fac33dc3bf8fc89a62a136f76fc4fd645e66ff8ec0b087e60c0703d657267753d119107ad74a7af6be9bc92bcb897854da90cc8554530e31797dfaa47d9fd28756f", 0x44}, {&(0x7f0000000140)="452a1ad5627c382933e21119e9858edd4b15dbda6bdd7b30688883d275cd12fbd08ccb151b98f7958d604ee36e330812e28b0655e6f9d766a277aaf4aeb450b031c4392d69fa55382df8aeeee8456ee5b863f0a7228ce1841eef951869445efd7aa105e961b1500c539d3c4c480ddc0babeeec427387c6804228e6273722c4bc422fb93a951b8aae", 0x88}, {&(0x7f0000000000)="1b2b5c825cf7522ac8af320b4f1bfc911d56e1ea041cec4eb379406abf08590ea6ed5f32", 0x24}, {&(0x7f0000000200)}, {&(0x7f0000000240)="f396553636748e2d99363b407e8b3d6b9412b7986d3958b5f059c3dda3f6e78bf60736e5bf48545dbed7a92202d9fd149ce0b3a3a9fb133b620c19191791aae914ca12dcd0a737b7f2dfe56c5fc3de7b412dfda4de5880047be014ad5f1f7b499e7da4", 0x63}], 0x5, 0x800, 0x10001, 0x0) (async, rerun: 64)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) (async)
close(r1) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
close(r0)

12:08:43 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r1 = syz_mount_image$omfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f0000000100)="80ddf3860ccb8c18b8422c6d86771e14c4b838e805357d22c6ade0505672078520bd1210eb7f0d6308b84d7dfcec4b8aba77c35fd094ac91c24d19eafa03cf9a7c70e07e2ba487", 0x47, 0x8000000000000001}, {&(0x7f0000000180)="7e4128acef9b119a0514742cdd7a57116a9196307eab5a826861119fad64142800364efbe95bbce99ef1d66e0f531f24e3f62fd294a28a7396a628e86bd01bc92acead71b07078a6a4613b3151f9675fea0b8aa48b54f0335c95cfaa752521e6ca9dc6eb028363ff8019d39ebe79577beb5371ad9c173d0cae8bde2ad74c1072f1bf860ffd1afeb7c14a9a881c52306308cf3b7634379520bf5d5603e793d5c9d4375bdff54bc66be390adeb58683d5285", 0xb1, 0x81}, {&(0x7f0000000240)="5674c685ed29cb24ec5c4838b95cfaaacf0697f8da78ee0cfb", 0x19, 0x4}, {&(0x7f0000000280)="6735518595de00242f14f0322b1b6535f858a265f1293af70b3fd8c34b641dd283b9ea01a7edb20e0ed442bc1257e8d193b6f918e1b39951bb45c56c46a5d33d4e9ab71d8aa2ce78e809dc18d67cbd01fab8d56d65288548e97c206136339e3dc754088248b59d8d5922e0c19671976aaa4055810aa539e813a752e8ffa69c6627ac9e401aef69fc30a65073346c11fb7e3acc5c9c4f42295ead3b7af61668fe392a72b74ae87b348a0e04d2991367c6a2b26d227ebfc24ad4ceb8b852171503b249091946", 0xc5, 0x1}, {&(0x7f0000000380)="10d6bc5eb8c530867ef35c04c266f1dde6929b9d9d7f5503c52fba2ba46cb535692c3b3835de83718f8b64d772776318d23ece3b239ee7f6bc129f9a32eade90a18134f7acc2556cc2c5c1771a157fc59df803a0d4bc8782a71226af66909eb2c46bea", 0x63, 0xfffffffffffffffb}], 0x10300a, &(0x7f0000000480)={[{'#/\\'}, {'}!\x00'}, {'T.]/:%'}, {}, {'}!\x00'}], [{@pcr={'pcr', 0x3d, 0x3d}}, {@obj_role={'obj_role', 0x3d, '}!\x00'}}, {@context={'context', 0x3d, 'root'}}]})
ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000540)={{0x1, 0x1, 0x18, <r2=>r0}, './file0\x00'})
ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000580))
openat(r1, &(0x7f0000000500)='./file0\x00', 0x400102, 0x8)

12:08:43 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 9)

12:08:43 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb) (async)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9) (async)
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x5, 0xa4, 0x1, 0x7e, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x288d, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x4800, 0x7, 0x9, 0x5, 0x9, 0x5b7, 0x6, 0x0, 0x80000001, 0x0, 0x8}, r1, 0x9, r0, 0x2) (async)
io_setup(0x3f, &(0x7f0000000140)=<r3=>0x0)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:43 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:43 executing program 1:
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'ip6erspan0\x00', {0x2, 0x4e21, @multicast1}})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000000)=0x401)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, <r2=>r1, {0x4800}}, './file0\x00'})
r3 = syz_mount_image$ufs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0xead, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000240)="6fc4e8e54fdc23fa586ce2fa8a89ab032b0a530d84fd20e5a7d565cad22b7a323d70363dea7c34e6a4bac86ed089bb614ded1946faf7cf740c35f3e588cf3acee9664aedea36f6589546e3c07a11900961d3bc88a7e11ca17097524fdfe2b69dd4d2f001d75cd2b114b33f781b179d39ce048f95bdb5b7ef5714c4ef44b79747fb278809669c0a32dddfedf44fb5c579ce13f26ad416a647781a563df95f6191210acc3b927971caa44838211726621be6c4306c6e22a35797f4783377487c58eab4b4005ed902668f83a4e307211b4784e08591af7e68febabf4635aeed61af6e20bce95ef7b9", 0xe7, 0x6}, {&(0x7f0000000340)="b10f6e1002d0632a728b6a7849380a36c8e2284df5e50cf58b90ff5b3fadd36748f21d9e8b8cf52c889ac3561dbbd23ff559769e33ece64ebfdb58", 0x3b, 0x1}, {&(0x7f0000000380)="ea9e743b042c7ea79738f69afad0b97e0ad0d664073c61cd7cbf0a718a521ffe654d85f1", 0x24, 0x1}, {&(0x7f0000000480)="c669e7a949afd4c9b0eb8f8ec4b1e376eadf182d4a1607eff32b1e272499c0caf58b48cbc9499b07bd5e38793ca355980eabbf080e1a6986e461c29381128a810aaebc5f491d26ac74062c5222620734e9276c8def9498808aaf12cb4bc174f681144f5cdfb81341f5bdf2e61bf6b8271d102bb624a1d99490369c2610a06df89cb3c9114150d68e7f2990d8c5afdca6ef347799cfa4a6636399f365961db02283f06097945593c98df20c1d8cffba7c0ca058fb14dbd4061ebcb3d62becea73b9637ef214f56808c0a8413e", 0xcc, 0x8001}, {&(0x7f0000000580)="95dae27d10801625b201c27db1f6420d0bdacd5aa909ff2c3399c47a81c3f3c79519aa204d3db77bf98c7c6006b7", 0x2e, 0xee}], 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="66642f33002c28292c2f646538afa7acc96d71a7002c2c7365636c6162656c2c7375626a5f726f6c653d2f6465762f75736572696f002c66736d616769633d3078303030303030303030303030303033662c657569643e", @ANYRESDEC=0x0, @ANYBLOB="2c7375626a5f757365723d852c2c00"])
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f00000006c0)={0x0, 0x1, r3, 0x1ff, 0x80000})
r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r4, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'ip6erspan0\x00', {0x2, 0x4e21, @multicast1}}) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000000)=0x401) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x4800}}, './file0\x00'}) (async)
syz_mount_image$ufs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0xead, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000240)="6fc4e8e54fdc23fa586ce2fa8a89ab032b0a530d84fd20e5a7d565cad22b7a323d70363dea7c34e6a4bac86ed089bb614ded1946faf7cf740c35f3e588cf3acee9664aedea36f6589546e3c07a11900961d3bc88a7e11ca17097524fdfe2b69dd4d2f001d75cd2b114b33f781b179d39ce048f95bdb5b7ef5714c4ef44b79747fb278809669c0a32dddfedf44fb5c579ce13f26ad416a647781a563df95f6191210acc3b927971caa44838211726621be6c4306c6e22a35797f4783377487c58eab4b4005ed902668f83a4e307211b4784e08591af7e68febabf4635aeed61af6e20bce95ef7b9", 0xe7, 0x6}, {&(0x7f0000000340)="b10f6e1002d0632a728b6a7849380a36c8e2284df5e50cf58b90ff5b3fadd36748f21d9e8b8cf52c889ac3561dbbd23ff559769e33ece64ebfdb58", 0x3b, 0x1}, {&(0x7f0000000380)="ea9e743b042c7ea79738f69afad0b97e0ad0d664073c61cd7cbf0a718a521ffe654d85f1", 0x24, 0x1}, {&(0x7f0000000480)="c669e7a949afd4c9b0eb8f8ec4b1e376eadf182d4a1607eff32b1e272499c0caf58b48cbc9499b07bd5e38793ca355980eabbf080e1a6986e461c29381128a810aaebc5f491d26ac74062c5222620734e9276c8def9498808aaf12cb4bc174f681144f5cdfb81341f5bdf2e61bf6b8271d102bb624a1d99490369c2610a06df89cb3c9114150d68e7f2990d8c5afdca6ef347799cfa4a6636399f365961db02283f06097945593c98df20c1d8cffba7c0ca058fb14dbd4061ebcb3d62becea73b9637ef214f56808c0a8413e", 0xcc, 0x8001}, {&(0x7f0000000580)="95dae27d10801625b201c27db1f6420d0bdacd5aa909ff2c3399c47a81c3f3c79519aa204d3db77bf98c7c6006b7", 0x2e, 0xee}], 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="66642f33002c28292c2f646538afa7acc96d71a7002c2c7365636c6162656c2c7375626a5f726f6c653d2f6465762f75736572696f002c66736d616769633d3078303030303030303030303030303033662c657569643e", @ANYRESDEC=0x0, @ANYBLOB="2c7375626a5f757365723d852c2c00"]) (async)
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f00000006c0)={0x0, 0x1, r3, 0x1ff, 0x80000}) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
preadv(r4, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)

[  276.948251] FAULT_INJECTION: forcing a failure.
[  276.948251] name failslab, interval 1, probability 0, space 0, times 0
[  276.960078] misc userio: Invalid payload size
[  276.961916] misc userio: Begin command sent, but we're already running
[  276.969907] misc userio: Invalid payload size
[  276.982075] ufs: ufs was compiled with read-only support, can't be mounted as read-write
[  276.991014] misc userio: Begin command sent, but we're already running
12:08:43 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r1 = syz_mount_image$omfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f0000000100)="80ddf3860ccb8c18b8422c6d86771e14c4b838e805357d22c6ade0505672078520bd1210eb7f0d6308b84d7dfcec4b8aba77c35fd094ac91c24d19eafa03cf9a7c70e07e2ba487", 0x47, 0x8000000000000001}, {&(0x7f0000000180)="7e4128acef9b119a0514742cdd7a57116a9196307eab5a826861119fad64142800364efbe95bbce99ef1d66e0f531f24e3f62fd294a28a7396a628e86bd01bc92acead71b07078a6a4613b3151f9675fea0b8aa48b54f0335c95cfaa752521e6ca9dc6eb028363ff8019d39ebe79577beb5371ad9c173d0cae8bde2ad74c1072f1bf860ffd1afeb7c14a9a881c52306308cf3b7634379520bf5d5603e793d5c9d4375bdff54bc66be390adeb58683d5285", 0xb1, 0x81}, {&(0x7f0000000240)="5674c685ed29cb24ec5c4838b95cfaaacf0697f8da78ee0cfb", 0x19, 0x4}, {&(0x7f0000000280)="6735518595de00242f14f0322b1b6535f858a265f1293af70b3fd8c34b641dd283b9ea01a7edb20e0ed442bc1257e8d193b6f918e1b39951bb45c56c46a5d33d4e9ab71d8aa2ce78e809dc18d67cbd01fab8d56d65288548e97c206136339e3dc754088248b59d8d5922e0c19671976aaa4055810aa539e813a752e8ffa69c6627ac9e401aef69fc30a65073346c11fb7e3acc5c9c4f42295ead3b7af61668fe392a72b74ae87b348a0e04d2991367c6a2b26d227ebfc24ad4ceb8b852171503b249091946", 0xc5, 0x1}, {&(0x7f0000000380)="10d6bc5eb8c530867ef35c04c266f1dde6929b9d9d7f5503c52fba2ba46cb535692c3b3835de83718f8b64d772776318d23ece3b239ee7f6bc129f9a32eade90a18134f7acc2556cc2c5c1771a157fc59df803a0d4bc8782a71226af66909eb2c46bea", 0x63, 0xfffffffffffffffb}], 0x10300a, &(0x7f0000000480)={[{'#/\\'}, {'}!\x00'}, {'T.]/:%'}, {}, {'}!\x00'}], [{@pcr={'pcr', 0x3d, 0x3d}}, {@obj_role={'obj_role', 0x3d, '}!\x00'}}, {@context={'context', 0x3d, 'root'}}]})
ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000540)={{0x1, 0x1, 0x18, <r2=>r0}, './file0\x00'})
ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000580))
openat(r1, &(0x7f0000000500)='./file0\x00', 0x400102, 0x8)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
syz_mount_image$omfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f0000000100)="80ddf3860ccb8c18b8422c6d86771e14c4b838e805357d22c6ade0505672078520bd1210eb7f0d6308b84d7dfcec4b8aba77c35fd094ac91c24d19eafa03cf9a7c70e07e2ba487", 0x47, 0x8000000000000001}, {&(0x7f0000000180)="7e4128acef9b119a0514742cdd7a57116a9196307eab5a826861119fad64142800364efbe95bbce99ef1d66e0f531f24e3f62fd294a28a7396a628e86bd01bc92acead71b07078a6a4613b3151f9675fea0b8aa48b54f0335c95cfaa752521e6ca9dc6eb028363ff8019d39ebe79577beb5371ad9c173d0cae8bde2ad74c1072f1bf860ffd1afeb7c14a9a881c52306308cf3b7634379520bf5d5603e793d5c9d4375bdff54bc66be390adeb58683d5285", 0xb1, 0x81}, {&(0x7f0000000240)="5674c685ed29cb24ec5c4838b95cfaaacf0697f8da78ee0cfb", 0x19, 0x4}, {&(0x7f0000000280)="6735518595de00242f14f0322b1b6535f858a265f1293af70b3fd8c34b641dd283b9ea01a7edb20e0ed442bc1257e8d193b6f918e1b39951bb45c56c46a5d33d4e9ab71d8aa2ce78e809dc18d67cbd01fab8d56d65288548e97c206136339e3dc754088248b59d8d5922e0c19671976aaa4055810aa539e813a752e8ffa69c6627ac9e401aef69fc30a65073346c11fb7e3acc5c9c4f42295ead3b7af61668fe392a72b74ae87b348a0e04d2991367c6a2b26d227ebfc24ad4ceb8b852171503b249091946", 0xc5, 0x1}, {&(0x7f0000000380)="10d6bc5eb8c530867ef35c04c266f1dde6929b9d9d7f5503c52fba2ba46cb535692c3b3835de83718f8b64d772776318d23ece3b239ee7f6bc129f9a32eade90a18134f7acc2556cc2c5c1771a157fc59df803a0d4bc8782a71226af66909eb2c46bea", 0x63, 0xfffffffffffffffb}], 0x10300a, &(0x7f0000000480)={[{'#/\\'}, {'}!\x00'}, {'T.]/:%'}, {}, {'}!\x00'}], [{@pcr={'pcr', 0x3d, 0x3d}}, {@obj_role={'obj_role', 0x3d, '}!\x00'}}, {@context={'context', 0x3d, 'root'}}]}) (async)
ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async)
ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000580)) (async)
openat(r1, &(0x7f0000000500)='./file0\x00', 0x400102, 0x8) (async)

[  276.991083] misc userio: Invalid payload size
[  277.011586] vxfs: WRONG superblock magic 00000000 at 1
[  277.020178] misc userio: Begin command sent, but we're already running
[  277.023284] vxfs: WRONG superblock magic 00000000 at 8
[  277.029645] CPU: 0 PID: 16905 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  277.040123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  277.049472] Call Trace:
[  277.051395] misc userio: Invalid payload size
[  277.052058]  dump_stack+0x1b2/0x281
[  277.060155]  should_fail.cold+0x10a/0x149
[  277.060193] vxfs: can't find superblock.
[  277.064295]  should_failslab+0xd6/0x130
[  277.064306]  kmem_cache_alloc_trace+0x29a/0x3d0
[  277.064320]  apparmor_file_alloc_security+0x129/0x800
[  277.064334]  security_file_alloc+0x66/0xa0
[  277.064343]  ? selinux_is_enabled+0x5/0x50
[  277.064354]  get_empty_filp+0x16b/0x3f0
[  277.064364]  path_openat+0x84/0x2970
[  277.064375]  ? check_preemption_disabled+0x35/0x240
[  277.064387]  ? perf_trace_lock+0xf7/0x490
[  277.064396]  ? path_lookupat+0x780/0x780
[  277.064406]  ? perf_trace_lock+0xf7/0x490
[  277.079920] misc userio: Invalid payload size
[  277.082244]  ? perf_trace_lock+0xf7/0x490
[  277.082261]  do_filp_open+0x179/0x3c0
[  277.082270]  ? may_open_dev+0xe0/0xe0
[  277.082282]  ? __alloc_fd+0x1be/0x490
[  277.135654]  ? lock_downgrade+0x740/0x740
[  277.139791]  ? do_raw_spin_unlock+0x164/0x220
[  277.144274]  ? _raw_spin_unlock+0x29/0x40
[  277.148405]  ? __alloc_fd+0x1be/0x490
[  277.152198]  do_sys_open+0x296/0x410
[  277.155898]  ? filp_open+0x60/0x60
[  277.159423]  ? SyS_pwrite64+0xca/0x140
[  277.163302]  ? do_syscall_64+0x4c/0x640
[  277.167258]  ? SyS_open+0x30/0x30
[  277.170696]  do_syscall_64+0x1d5/0x640
[  277.174573]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  277.179744] RIP: 0033:0x7faf49c5e124
[  277.183448] RSP: 002b:00007faf4861feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  277.191148] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49c5e124
12:08:43 executing program 0:
syz_mount_image$msdos(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x15, 0x6, &(0x7f0000001500)=[{&(0x7f0000000180)="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", 0x1000, 0x401}, {&(0x7f0000001180)="b0b31793cd8b960621193742f6d7ea4e8c6ff774406547621d85698fb128a0509ffbc843c9bf644342c5a2321b8d9aae4ede96a0fdbc1c0afcd1cc159001b8a0a2260579d0e0b2efb5", 0x49, 0x6}, {&(0x7f0000001240)="329f181b66ea9c41362f14ba2acf96dee3ab7eec2e9d73b2ccad2f4c7a316dfc268e41b6f27df10e2745150da1ef2e20673bb877b169d2cf437cc613d885f72116f140a17ecfe4a05676ce3e019bfb923237704e355cd125ff48f20c0a753bbea6a23a8407844d6842de8fbb6c1e6c32ff86b93ebe9aa20955446fd119d42917438274ebc22cd197b97d743ee6f400a8c89a81cf3c2d4b6db774d976f33deef33bd1b4f55861872e388731f9d776c99a8801641c61a6335cbf8122be4f42e97f2f", 0xc1, 0x95f}, {&(0x7f0000001340)="d7e11a89aa71a82dbfd21f66abdad222d3783a8920f59a5c77f0eb2023a71961b485d70882640cfe6e1599e265eeda7bdf4c728f9f41cb6befaf6031531dbfcae58a884c3820f81222265d5d2626b93e47efced218385c71eed42de8069117f20f14f0d68196122779512fb1c86f4f884ded7b131775a38e0ed0b66a77d56520eb5198b5412444fd9b72d4bd41942c9bc16c772ed642b3e85f980a7689617e9dab34b46af6cae1fb948fadcc", 0xac, 0x9}, {&(0x7f0000001400)="319d355eb5aeaa6ef4428f9c8e89e77e160eda0d03ed082c0d553ee15360acc7e0a58d6fb1234093bfe256f4ed080d77ec5fc780a4354128e5f303557850a8b75a831a202d51d582d1dfcdd0a316ca46a53238d239c73192bbbf6089b4700e650addd8fc0873e7e09f6ca8c21c809b63386c", 0x72, 0x8000}, {&(0x7f0000001480)="603f6af526e66b7b6637d0fd790a61a877ab99211abb4053595f387a4667526d5401c1bd74d6d9a7176c53876ebf7bac9048ef6f901e711400a03aae38712acb33490e9caf9e245f2cb324366d39ae993b64184ea5", 0x55, 0x3}], 0x800, &(0x7f00000015c0)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x6}}, {@nodots}], [{@uid_eq}, {@hash}, {@dont_hash}]})
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001640)={&(0x7f0000000100)=[0x8000, 0x1, 0x8000, 0x2], 0x4, 0x800, 0x0, <r1=>0xffffffffffffffff})
ftruncate(r1, 0x9)
r2 = socket(0x2, 0x2, 0x7)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x10001}, 0x0)
r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000016c0), 0x500, 0x0)
ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000001700)={0x401, 0x521, 0xfffffffffffffffd})
io_setup(0x8, &(0x7f0000001680))

[  277.198398] RDX: 0000000000000002 RSI: 00007faf4861ffe0 RDI: 00000000ffffff9c
[  277.205650] RBP: 00007faf4861ffe0 R08: 0000000000000000 R09: 00007faf486201d0
[  277.212934] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[  277.220187] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  277.260446] misc userio: Begin command sent, but we're already running
[  277.262369] misc userio: Invalid payload size
[  277.290332] misc userio: Begin command sent, but we're already running
12:08:43 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]})

12:08:43 executing program 1:
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'ip6erspan0\x00', {0x2, 0x4e21, @multicast1}})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000000)=0x401)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, <r2=>r1, {0x4800}}, './file0\x00'})
r3 = syz_mount_image$ufs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0xead, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000240)="6fc4e8e54fdc23fa586ce2fa8a89ab032b0a530d84fd20e5a7d565cad22b7a323d70363dea7c34e6a4bac86ed089bb614ded1946faf7cf740c35f3e588cf3acee9664aedea36f6589546e3c07a11900961d3bc88a7e11ca17097524fdfe2b69dd4d2f001d75cd2b114b33f781b179d39ce048f95bdb5b7ef5714c4ef44b79747fb278809669c0a32dddfedf44fb5c579ce13f26ad416a647781a563df95f6191210acc3b927971caa44838211726621be6c4306c6e22a35797f4783377487c58eab4b4005ed902668f83a4e307211b4784e08591af7e68febabf4635aeed61af6e20bce95ef7b9", 0xe7, 0x6}, {&(0x7f0000000340)="b10f6e1002d0632a728b6a7849380a36c8e2284df5e50cf58b90ff5b3fadd36748f21d9e8b8cf52c889ac3561dbbd23ff559769e33ece64ebfdb58", 0x3b, 0x1}, {&(0x7f0000000380)="ea9e743b042c7ea79738f69afad0b97e0ad0d664073c61cd7cbf0a718a521ffe654d85f1", 0x24, 0x1}, {&(0x7f0000000480)="c669e7a949afd4c9b0eb8f8ec4b1e376eadf182d4a1607eff32b1e272499c0caf58b48cbc9499b07bd5e38793ca355980eabbf080e1a6986e461c29381128a810aaebc5f491d26ac74062c5222620734e9276c8def9498808aaf12cb4bc174f681144f5cdfb81341f5bdf2e61bf6b8271d102bb624a1d99490369c2610a06df89cb3c9114150d68e7f2990d8c5afdca6ef347799cfa4a6636399f365961db02283f06097945593c98df20c1d8cffba7c0ca058fb14dbd4061ebcb3d62becea73b9637ef214f56808c0a8413e", 0xcc, 0x8001}, {&(0x7f0000000580)="95dae27d10801625b201c27db1f6420d0bdacd5aa909ff2c3399c47a81c3f3c79519aa204d3db77bf98c7c6006b7", 0x2e, 0xee}], 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="66642f33002c28292c2f646538afa7acc96d71a7002c2c7365636c6162656c2c7375626a5f726f6c653d2f6465762f75736572696f002c66736d616769633d3078303030303030303030303030303033662c657569643e", @ANYRESDEC=0x0, @ANYBLOB="2c7375626a5f757365723d852c2c00"])
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f00000006c0)={0x0, 0x1, r3, 0x1ff, 0x80000})
r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r4, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'ip6erspan0\x00', {0x2, 0x4e21, @multicast1}}) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000000)=0x401) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x4800}}, './file0\x00'}) (async)
syz_mount_image$ufs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0xead, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000240)="6fc4e8e54fdc23fa586ce2fa8a89ab032b0a530d84fd20e5a7d565cad22b7a323d70363dea7c34e6a4bac86ed089bb614ded1946faf7cf740c35f3e588cf3acee9664aedea36f6589546e3c07a11900961d3bc88a7e11ca17097524fdfe2b69dd4d2f001d75cd2b114b33f781b179d39ce048f95bdb5b7ef5714c4ef44b79747fb278809669c0a32dddfedf44fb5c579ce13f26ad416a647781a563df95f6191210acc3b927971caa44838211726621be6c4306c6e22a35797f4783377487c58eab4b4005ed902668f83a4e307211b4784e08591af7e68febabf4635aeed61af6e20bce95ef7b9", 0xe7, 0x6}, {&(0x7f0000000340)="b10f6e1002d0632a728b6a7849380a36c8e2284df5e50cf58b90ff5b3fadd36748f21d9e8b8cf52c889ac3561dbbd23ff559769e33ece64ebfdb58", 0x3b, 0x1}, {&(0x7f0000000380)="ea9e743b042c7ea79738f69afad0b97e0ad0d664073c61cd7cbf0a718a521ffe654d85f1", 0x24, 0x1}, {&(0x7f0000000480)="c669e7a949afd4c9b0eb8f8ec4b1e376eadf182d4a1607eff32b1e272499c0caf58b48cbc9499b07bd5e38793ca355980eabbf080e1a6986e461c29381128a810aaebc5f491d26ac74062c5222620734e9276c8def9498808aaf12cb4bc174f681144f5cdfb81341f5bdf2e61bf6b8271d102bb624a1d99490369c2610a06df89cb3c9114150d68e7f2990d8c5afdca6ef347799cfa4a6636399f365961db02283f06097945593c98df20c1d8cffba7c0ca058fb14dbd4061ebcb3d62becea73b9637ef214f56808c0a8413e", 0xcc, 0x8001}, {&(0x7f0000000580)="95dae27d10801625b201c27db1f6420d0bdacd5aa909ff2c3399c47a81c3f3c79519aa204d3db77bf98c7c6006b7", 0x2e, 0xee}], 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="66642f33002c28292c2f646538afa7acc96d71a7002c2c7365636c6162656c2c7375626a5f726f6c653d2f6465762f75736572696f002c66736d616769633d3078303030303030303030303030303033662c657569643e", @ANYRESDEC=0x0, @ANYBLOB="2c7375626a5f757365723d852c2c00"]) (async)
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f00000006c0)={0x0, 0x1, r3, 0x1ff, 0x80000}) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
preadv(r4, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)

[  277.308685] misc userio: Invalid payload size
[  277.336070] misc userio: Begin command sent, but we're already running
[  277.343198] misc userio: Begin command sent, but we're already running
[  277.344147] misc userio: Invalid payload size
[  277.354606] misc userio: Begin command sent, but we're already running
[  277.361675] misc userio: Begin command sent, but we're already running
[  277.387384] misc userio: Begin command sent, but we're already running
[  277.392597] misc userio: Invalid payload size
[  277.407239] misc userio: Invalid payload size
[  277.407898] vxfs: WRONG superblock magic 00000000 at 1
[  277.418387] misc userio: Invalid payload size
[  277.425034] misc userio: Begin command sent, but we're already running
[  277.430899] ufs: ufs was compiled with read-only support, can't be mounted as read-write
[  277.443040] misc userio: Invalid payload size
[  277.450668] misc userio: Invalid payload size
[  277.466029] misc userio: Begin command sent, but we're already running
[  277.469205] misc userio: Invalid payload size
[  277.477503] misc userio: Invalid payload size
[  277.479848] vxfs: WRONG superblock magic 00000000 at 8
12:08:43 executing program 0:
syz_mount_image$msdos(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x15, 0x6, &(0x7f0000001500)=[{&(0x7f0000000180)="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", 0x1000, 0x401}, {&(0x7f0000001180)="b0b31793cd8b960621193742f6d7ea4e8c6ff774406547621d85698fb128a0509ffbc843c9bf644342c5a2321b8d9aae4ede96a0fdbc1c0afcd1cc159001b8a0a2260579d0e0b2efb5", 0x49, 0x6}, {&(0x7f0000001240)="329f181b66ea9c41362f14ba2acf96dee3ab7eec2e9d73b2ccad2f4c7a316dfc268e41b6f27df10e2745150da1ef2e20673bb877b169d2cf437cc613d885f72116f140a17ecfe4a05676ce3e019bfb923237704e355cd125ff48f20c0a753bbea6a23a8407844d6842de8fbb6c1e6c32ff86b93ebe9aa20955446fd119d42917438274ebc22cd197b97d743ee6f400a8c89a81cf3c2d4b6db774d976f33deef33bd1b4f55861872e388731f9d776c99a8801641c61a6335cbf8122be4f42e97f2f", 0xc1, 0x95f}, {&(0x7f0000001340)="d7e11a89aa71a82dbfd21f66abdad222d3783a8920f59a5c77f0eb2023a71961b485d70882640cfe6e1599e265eeda7bdf4c728f9f41cb6befaf6031531dbfcae58a884c3820f81222265d5d2626b93e47efced218385c71eed42de8069117f20f14f0d68196122779512fb1c86f4f884ded7b131775a38e0ed0b66a77d56520eb5198b5412444fd9b72d4bd41942c9bc16c772ed642b3e85f980a7689617e9dab34b46af6cae1fb948fadcc", 0xac, 0x9}, {&(0x7f0000001400)="319d355eb5aeaa6ef4428f9c8e89e77e160eda0d03ed082c0d553ee15360acc7e0a58d6fb1234093bfe256f4ed080d77ec5fc780a4354128e5f303557850a8b75a831a202d51d582d1dfcdd0a316ca46a53238d239c73192bbbf6089b4700e650addd8fc0873e7e09f6ca8c21c809b63386c", 0x72, 0x8000}, {&(0x7f0000001480)="603f6af526e66b7b6637d0fd790a61a877ab99211abb4053595f387a4667526d5401c1bd74d6d9a7176c53876ebf7bac9048ef6f901e711400a03aae38712acb33490e9caf9e245f2cb324366d39ae993b64184ea5", 0x55, 0x3}], 0x800, &(0x7f00000015c0)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x6}}, {@nodots}], [{@uid_eq}, {@hash}, {@dont_hash}]})
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0) (async)
ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001640)={&(0x7f0000000100)=[0x8000, 0x1, 0x8000, 0x2], 0x4, 0x800, 0x0, <r1=>0xffffffffffffffff})
ftruncate(r1, 0x9) (async)
r2 = socket(0x2, 0x2, 0x7)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x10001}, 0x0) (async)
r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000016c0), 0x500, 0x0)
ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000001700)={0x401, 0x521, 0xfffffffffffffffd})
io_setup(0x8, &(0x7f0000001680))

12:08:43 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000000)={0x2, 0x68}, 0x2)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f0000000140))
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

[  277.482134] misc userio: Invalid payload size
[  277.494992] misc userio: Begin command sent, but we're already running
[  277.508285] vxfs: can't find superblock.
[  277.521266] misc userio: Invalid payload size
[  277.521661] misc userio: Begin command sent, but we're already running
[  277.531586] misc userio: Invalid payload size
[  277.532585] misc userio: Begin command sent, but we're already running
[  277.565004] misc userio: Invalid payload size
[  277.571794] misc userio: Begin command sent, but we're already running
[  277.574358] misc userio: Invalid payload size
[  277.583332] misc userio: Invalid payload size
[  277.597893] misc userio: Invalid payload size
[  277.608441] misc userio: Invalid payload size
[  277.627031] misc userio: Invalid payload size
[  277.633767] misc userio: Invalid payload size
[  277.634145] misc userio: Begin command sent, but we're already running
[  277.643065] misc userio: Invalid payload size
[  277.651559] misc userio: Invalid payload size
[  277.658756] misc userio: Invalid payload size
[  277.663432] misc userio: Invalid payload size
[  277.676916] misc userio: Invalid payload size
[  277.681580] misc userio: Invalid payload size
[  277.689184] misc userio: Invalid payload size
[  277.693440] misc userio: Begin command sent, but we're already running
[  277.699368] misc userio: Invalid payload size
[  277.706611] misc userio: Begin command sent, but we're already running
[  277.709659] misc userio: Invalid payload size
[  277.713532] misc userio: Begin command sent, but we're already running
[  277.725641] misc userio: Invalid payload size
[  277.730247] misc userio: Invalid payload size
[  277.735679] misc userio: Begin command sent, but we're already running
[  277.735808] misc userio: Invalid payload size
[  277.742626] misc userio: Begin command sent, but we're already running
[  277.749411] misc userio: Invalid payload size
[  277.761843] misc userio: Invalid payload size
[  277.770111] misc userio: Invalid payload size
[  277.775073] misc userio: Invalid payload size
[  277.776981] misc userio: Begin command sent, but we're already running
12:08:45 executing program 3:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
pwritev2(r2, &(0x7f00000002c0)=[{&(0x7f0000000080)="33ce4fac33dc3bf8fc89a62a136f76fc4fd645e66ff8ec0b087e60c0703d657267753d119107ad74a7af6be9bc92bcb897854da90cc8554530e31797dfaa47d9fd28756f", 0x44}, {&(0x7f0000000140)="452a1ad5627c382933e21119e9858edd4b15dbda6bdd7b30688883d275cd12fbd08ccb151b98f7958d604ee36e330812e28b0655e6f9d766a277aaf4aeb450b031c4392d69fa55382df8aeeee8456ee5b863f0a7228ce1841eef951869445efd7aa105e961b1500c539d3c4c480ddc0babeeec427387c6804228e6273722c4bc422fb93a951b8aae", 0x88}, {&(0x7f0000000000)="1b2b5c825cf7522ac8af320b4f1bfc911d56e1ea041cec4eb379406abf08590ea6ed5f32", 0x24}, {&(0x7f0000000200)}, {&(0x7f0000000240)="f396553636748e2d99363b407e8b3d6b9412b7986d3958b5f059c3dda3f6e78bf60736e5bf48545dbed7a92202d9fd149ce0b3a3a9fb133b620c19191791aae914ca12dcd0a737b7f2dfe56c5fc3de7b412dfda4de5880047be014ad5f1f7b499e7da4", 0x63}], 0x5, 0x800, 0x10001, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2)
close(r1)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
close(r0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2) (async)
pwritev2(r2, &(0x7f00000002c0)=[{&(0x7f0000000080)="33ce4fac33dc3bf8fc89a62a136f76fc4fd645e66ff8ec0b087e60c0703d657267753d119107ad74a7af6be9bc92bcb897854da90cc8554530e31797dfaa47d9fd28756f", 0x44}, {&(0x7f0000000140)="452a1ad5627c382933e21119e9858edd4b15dbda6bdd7b30688883d275cd12fbd08ccb151b98f7958d604ee36e330812e28b0655e6f9d766a277aaf4aeb450b031c4392d69fa55382df8aeeee8456ee5b863f0a7228ce1841eef951869445efd7aa105e961b1500c539d3c4c480ddc0babeeec427387c6804228e6273722c4bc422fb93a951b8aae", 0x88}, {&(0x7f0000000000)="1b2b5c825cf7522ac8af320b4f1bfc911d56e1ea041cec4eb379406abf08590ea6ed5f32", 0x24}, {&(0x7f0000000200)}, {&(0x7f0000000240)="f396553636748e2d99363b407e8b3d6b9412b7986d3958b5f059c3dda3f6e78bf60736e5bf48545dbed7a92202d9fd149ce0b3a3a9fb133b620c19191791aae914ca12dcd0a737b7f2dfe56c5fc3de7b412dfda4de5880047be014ad5f1f7b499e7da4", 0x63}], 0x5, 0x800, 0x10001, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) (async)
close(r1) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
close(r0) (async)

12:08:45 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 1)

12:08:45 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 10)

12:08:45 executing program 0:
syz_mount_image$msdos(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x15, 0x6, &(0x7f0000001500)=[{&(0x7f0000000180)="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", 0x1000, 0x401}, {&(0x7f0000001180)="b0b31793cd8b960621193742f6d7ea4e8c6ff774406547621d85698fb128a0509ffbc843c9bf644342c5a2321b8d9aae4ede96a0fdbc1c0afcd1cc159001b8a0a2260579d0e0b2efb5", 0x49, 0x6}, {&(0x7f0000001240)="329f181b66ea9c41362f14ba2acf96dee3ab7eec2e9d73b2ccad2f4c7a316dfc268e41b6f27df10e2745150da1ef2e20673bb877b169d2cf437cc613d885f72116f140a17ecfe4a05676ce3e019bfb923237704e355cd125ff48f20c0a753bbea6a23a8407844d6842de8fbb6c1e6c32ff86b93ebe9aa20955446fd119d42917438274ebc22cd197b97d743ee6f400a8c89a81cf3c2d4b6db774d976f33deef33bd1b4f55861872e388731f9d776c99a8801641c61a6335cbf8122be4f42e97f2f", 0xc1, 0x95f}, {&(0x7f0000001340)="d7e11a89aa71a82dbfd21f66abdad222d3783a8920f59a5c77f0eb2023a71961b485d70882640cfe6e1599e265eeda7bdf4c728f9f41cb6befaf6031531dbfcae58a884c3820f81222265d5d2626b93e47efced218385c71eed42de8069117f20f14f0d68196122779512fb1c86f4f884ded7b131775a38e0ed0b66a77d56520eb5198b5412444fd9b72d4bd41942c9bc16c772ed642b3e85f980a7689617e9dab34b46af6cae1fb948fadcc", 0xac, 0x9}, {&(0x7f0000001400)="319d355eb5aeaa6ef4428f9c8e89e77e160eda0d03ed082c0d553ee15360acc7e0a58d6fb1234093bfe256f4ed080d77ec5fc780a4354128e5f303557850a8b75a831a202d51d582d1dfcdd0a316ca46a53238d239c73192bbbf6089b4700e650addd8fc0873e7e09f6ca8c21c809b63386c", 0x72, 0x8000}, {&(0x7f0000001480)="603f6af526e66b7b6637d0fd790a61a877ab99211abb4053595f387a4667526d5401c1bd74d6d9a7176c53876ebf7bac9048ef6f901e711400a03aae38712acb33490e9caf9e245f2cb324366d39ae993b64184ea5", 0x55, 0x3}], 0x800, &(0x7f00000015c0)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x6}}, {@nodots}], [{@uid_eq}, {@hash}, {@dont_hash}]})
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001640)={&(0x7f0000000100)=[0x8000, 0x1, 0x8000, 0x2], 0x4, 0x800, 0x0, <r1=>0xffffffffffffffff})
ftruncate(r1, 0x9)
r2 = socket(0x2, 0x2, 0x7)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x10001}, 0x0)
r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000016c0), 0x500, 0x0)
ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000001700)={0x401, 0x521, 0xfffffffffffffffd})
io_setup(0x8, &(0x7f0000001680))
syz_mount_image$msdos(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x15, 0x6, &(0x7f0000001500)=[{&(0x7f0000000180)="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", 0x1000, 0x401}, {&(0x7f0000001180)="b0b31793cd8b960621193742f6d7ea4e8c6ff774406547621d85698fb128a0509ffbc843c9bf644342c5a2321b8d9aae4ede96a0fdbc1c0afcd1cc159001b8a0a2260579d0e0b2efb5", 0x49, 0x6}, {&(0x7f0000001240)="329f181b66ea9c41362f14ba2acf96dee3ab7eec2e9d73b2ccad2f4c7a316dfc268e41b6f27df10e2745150da1ef2e20673bb877b169d2cf437cc613d885f72116f140a17ecfe4a05676ce3e019bfb923237704e355cd125ff48f20c0a753bbea6a23a8407844d6842de8fbb6c1e6c32ff86b93ebe9aa20955446fd119d42917438274ebc22cd197b97d743ee6f400a8c89a81cf3c2d4b6db774d976f33deef33bd1b4f55861872e388731f9d776c99a8801641c61a6335cbf8122be4f42e97f2f", 0xc1, 0x95f}, {&(0x7f0000001340)="d7e11a89aa71a82dbfd21f66abdad222d3783a8920f59a5c77f0eb2023a71961b485d70882640cfe6e1599e265eeda7bdf4c728f9f41cb6befaf6031531dbfcae58a884c3820f81222265d5d2626b93e47efced218385c71eed42de8069117f20f14f0d68196122779512fb1c86f4f884ded7b131775a38e0ed0b66a77d56520eb5198b5412444fd9b72d4bd41942c9bc16c772ed642b3e85f980a7689617e9dab34b46af6cae1fb948fadcc", 0xac, 0x9}, {&(0x7f0000001400)="319d355eb5aeaa6ef4428f9c8e89e77e160eda0d03ed082c0d553ee15360acc7e0a58d6fb1234093bfe256f4ed080d77ec5fc780a4354128e5f303557850a8b75a831a202d51d582d1dfcdd0a316ca46a53238d239c73192bbbf6089b4700e650addd8fc0873e7e09f6ca8c21c809b63386c", 0x72, 0x8000}, {&(0x7f0000001480)="603f6af526e66b7b6637d0fd790a61a877ab99211abb4053595f387a4667526d5401c1bd74d6d9a7176c53876ebf7bac9048ef6f901e711400a03aae38712acb33490e9caf9e245f2cb324366d39ae993b64184ea5", 0x55, 0x3}], 0x800, &(0x7f00000015c0)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x6}}, {@nodots}], [{@uid_eq}, {@hash}, {@dont_hash}]}) (async)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001640)={&(0x7f0000000100)=[0x8000, 0x1, 0x8000, 0x2], 0x4, 0x800}) (async)
ftruncate(r1, 0x9) (async)
socket(0x2, 0x2, 0x7) (async)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x10001}, 0x0) (async)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000016c0), 0x500, 0x0) (async)
ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000001700)={0x401, 0x521, 0xfffffffffffffffd}) (async)
io_setup(0x8, &(0x7f0000001680)) (async)

12:08:45 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r1 = syz_mount_image$omfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f0000000100)="80ddf3860ccb8c18b8422c6d86771e14c4b838e805357d22c6ade0505672078520bd1210eb7f0d6308b84d7dfcec4b8aba77c35fd094ac91c24d19eafa03cf9a7c70e07e2ba487", 0x47, 0x8000000000000001}, {&(0x7f0000000180)="7e4128acef9b119a0514742cdd7a57116a9196307eab5a826861119fad64142800364efbe95bbce99ef1d66e0f531f24e3f62fd294a28a7396a628e86bd01bc92acead71b07078a6a4613b3151f9675fea0b8aa48b54f0335c95cfaa752521e6ca9dc6eb028363ff8019d39ebe79577beb5371ad9c173d0cae8bde2ad74c1072f1bf860ffd1afeb7c14a9a881c52306308cf3b7634379520bf5d5603e793d5c9d4375bdff54bc66be390adeb58683d5285", 0xb1, 0x81}, {&(0x7f0000000240)="5674c685ed29cb24ec5c4838b95cfaaacf0697f8da78ee0cfb", 0x19, 0x4}, {&(0x7f0000000280)="6735518595de00242f14f0322b1b6535f858a265f1293af70b3fd8c34b641dd283b9ea01a7edb20e0ed442bc1257e8d193b6f918e1b39951bb45c56c46a5d33d4e9ab71d8aa2ce78e809dc18d67cbd01fab8d56d65288548e97c206136339e3dc754088248b59d8d5922e0c19671976aaa4055810aa539e813a752e8ffa69c6627ac9e401aef69fc30a65073346c11fb7e3acc5c9c4f42295ead3b7af61668fe392a72b74ae87b348a0e04d2991367c6a2b26d227ebfc24ad4ceb8b852171503b249091946", 0xc5, 0x1}, {&(0x7f0000000380)="10d6bc5eb8c530867ef35c04c266f1dde6929b9d9d7f5503c52fba2ba46cb535692c3b3835de83718f8b64d772776318d23ece3b239ee7f6bc129f9a32eade90a18134f7acc2556cc2c5c1771a157fc59df803a0d4bc8782a71226af66909eb2c46bea", 0x63, 0xfffffffffffffffb}], 0x10300a, &(0x7f0000000480)={[{'#/\\'}, {'}!\x00'}, {'T.]/:%'}, {}, {'}!\x00'}], [{@pcr={'pcr', 0x3d, 0x3d}}, {@obj_role={'obj_role', 0x3d, '}!\x00'}}, {@context={'context', 0x3d, 'root'}}]}) (async)
ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000540)={{0x1, 0x1, 0x18, <r2=>r0}, './file0\x00'})
ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000580)) (async)
openat(r1, &(0x7f0000000500)='./file0\x00', 0x400102, 0x8)

12:08:45 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async, rerun: 32)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) (async, rerun: 32)
write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000000)={0x2, 0x68}, 0x2) (async, rerun: 32)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (rerun: 32)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f0000000140)) (async, rerun: 64)
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (rerun: 64)

[  278.746618] FAULT_INJECTION: forcing a failure.
[  278.746618] name failslab, interval 1, probability 0, space 0, times 0
[  278.762713] FAULT_INJECTION: forcing a failure.
[  278.762713] name failslab, interval 1, probability 0, space 0, times 0
[  278.776021] CPU: 0 PID: 17007 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  278.783557] misc userio: Invalid payload size
[  278.783911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  278.783917] Call Trace:
[  278.783931]  dump_stack+0x1b2/0x281
[  278.783946]  should_fail.cold+0x10a/0x149
[  278.783960]  should_failslab+0xd6/0x130
[  278.783974]  __kmalloc+0x2c1/0x400
[  278.783984]  ? SyS_memfd_create+0xbc/0x3c0
[  278.783996]  SyS_memfd_create+0xbc/0x3c0
[  278.784006]  ? shmem_fcntl+0x120/0x120
[  278.784016]  ? __do_page_fault+0x159/0xad0
[  278.784026]  ? do_syscall_64+0x4c/0x640
[  278.784035]  ? shmem_fcntl+0x120/0x120
[  278.784045]  do_syscall_64+0x1d5/0x640
[  278.784060]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  278.784068] RIP: 0033:0x7f5c30cee209
[  278.784073] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  278.784084] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cee209
[  278.784090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f5c30d4729c
[  278.784096] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  278.784101] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000
[  278.784107] R13: 0000000020005a00 R14: 0000000000000000 R15: 0000000020006080
[  278.798828] misc userio: Begin command sent, but we're already running
[  278.831723] CPU: 1 PID: 17008 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  278.845801] misc userio: Begin command sent, but we're already running
[  278.849470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  278.849475] Call Trace:
[  278.849489]  dump_stack+0x1b2/0x281
[  278.849503]  should_fail.cold+0x10a/0x149
[  278.853227] misc userio: Begin command sent, but we're already running
12:08:45 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 2)

[  278.860889]  should_failslab+0xd6/0x130
[  278.860901]  kmem_cache_alloc_trace+0x29a/0x3d0
[  278.860913]  ? loop_get_status64+0x100/0x100
[  278.860923]  __kthread_create_on_node+0xbe/0x3a0
[  278.860933]  ? kthread_park+0x130/0x130
[  278.860955]  ? loop_get_status64+0x100/0x100
[  278.860965]  kthread_create_on_node+0xa8/0xd0
[  278.860978]  ? __kthread_create_on_node+0x3a0/0x3a0
[  278.860992]  ? __lockdep_init_map+0x100/0x560
[  278.861002]  ? __lockdep_init_map+0x100/0x560
[  278.872662] misc userio: Begin command sent, but we're already running
[  278.875537]  lo_ioctl+0xcd9/0x1cd0
[  278.875551]  ? loop_set_status64+0xe0/0xe0
[  278.875566]  blkdev_ioctl+0x540/0x1830
[  278.875576]  ? blkpg_ioctl+0x8d0/0x8d0
[  278.875587]  ? trace_hardirqs_on+0x10/0x10
[  278.882885] misc userio: Begin command sent, but we're already running
[  278.890110]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  278.890121]  ? debug_check_no_obj_freed+0x2c0/0x680
[  278.890137]  block_ioctl+0xd9/0x120
[  278.890146]  ? blkdev_fallocate+0x3a0/0x3a0
[  278.890158]  do_vfs_ioctl+0x75a/0xff0
[  278.890168]  ? lock_acquire+0x170/0x3f0
[  278.890178]  ? ioctl_preallocate+0x1a0/0x1a0
[  278.890192]  ? __fget+0x265/0x3e0
[  278.890204]  ? do_vfs_ioctl+0xff0/0xff0
[  278.890216]  ? security_file_ioctl+0x83/0xb0
[  278.890227]  SyS_ioctl+0x7f/0xb0
[  278.901959] misc userio: Begin command sent, but we're already running
[  278.904158]  ? do_vfs_ioctl+0xff0/0xff0
[  278.904172]  do_syscall_64+0x1d5/0x640
[  278.904187]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  278.904196] RIP: 0033:0x7faf49caafc7
12:08:45 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 11)

[  278.904203] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246
[  278.912106] misc userio: Begin command sent, but we're already running
[  278.918971]  ORIG_RAX: 0000000000000010
[  278.918977] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  278.918982] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  278.918988] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  278.918993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  278.918998] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  278.973930] misc userio: No port type given on /dev/userio
[  278.987955] misc userio: Begin command sent, but we're already running
[  279.121125] FAULT_INJECTION: forcing a failure.
[  279.121125] name failslab, interval 1, probability 0, space 0, times 0
[  279.130594] misc userio: Begin command sent, but we're already running
[  279.138695] CPU: 1 PID: 17050 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  279.142624] misc userio: Begin command sent, but we're already running
12:08:45 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe5bdc9, 0x12f, 0x80000003, 0x2, 0x6e6f, 0x80000001, 0x5, 0x0, 0x70, 0x0, 0x7}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r0, 0x0, 0x3, &(0x7f0000000000)='#\\\x00'}, 0x30)
io_setup(0x3f, &(0x7f0000000140)=<r3=>0x0)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  279.146035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  279.146040] Call Trace:
[  279.146056]  dump_stack+0x1b2/0x281
[  279.146070]  should_fail.cold+0x10a/0x149
[  279.146084]  should_failslab+0xd6/0x130
[  279.146096]  kmem_cache_alloc+0x28e/0x3c0
[  279.146109]  __d_alloc+0x2a/0xa20
[  279.146121]  ? lock_downgrade+0x740/0x740
[  279.146135]  __shmem_file_setup.part.0+0xcb/0x3c0
[  279.146145]  ? shmem_create+0x30/0x30
[  279.146153]  ? __alloc_fd+0x1be/0x490
[  279.146167]  SyS_memfd_create+0x1fc/0x3c0
[  279.146175]  ? shmem_fcntl+0x120/0x120
12:08:45 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x8880, 0x0)
r2 = socket(0x2, 0x80805, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10)
r3 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r4=>0x0}, &(0x7f0000000040)=0x8)
setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, r4}, 0x10)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r4, 0x4)
r5 = socket$nl_generic(0x10, 0x3, 0x10)
r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
sendmsg$NL80211_CMD_GET_WOWLAN(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x2}, @val={0x8}, @void}}}, 0x24}}, 0x0)
sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000428bd7000ffdbdf25150000000c009900070000002b0000000a001a0008021100000000000a00060008021100000000000a00060008021100000000000a00060008021100000100000a00060008021100000100000a0006000802110000010000"], 0x68}, 0x1, 0x0, 0x0, 0x4040808}, 0x0)
setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r4, 0x3ff}, 0x8)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc020660b, &(0x7f0000000140))
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0xb630}}, './file0\x00'})

[  279.146185]  ? __do_page_fault+0x159/0xad0
[  279.146196]  ? do_syscall_64+0x4c/0x640
[  279.146204]  ? shmem_fcntl+0x120/0x120
[  279.146214]  do_syscall_64+0x1d5/0x640
[  279.146228]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  279.146236] RIP: 0033:0x7f5c30cee209
[  279.146240] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  279.146251] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cee209
[  279.146259] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f5c30d4729c
12:08:45 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) (async, rerun: 32)
r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x8880, 0x0) (async, rerun: 32)
r2 = socket(0x2, 0x80805, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) (async)
r3 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r4=>0x0}, &(0x7f0000000040)=0x8)
setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, r4}, 0x10)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r4, 0x4) (async)
r5 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32)
r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) (rerun: 32)
sendmsg$NL80211_CMD_GET_WOWLAN(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x2}, @val={0x8}, @void}}}, 0x24}}, 0x0) (async)
sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000428bd7000ffdbdf25150000000c009900070000002b0000000a001a0008021100000000000a00060008021100000000000a00060008021100000000000a00060008021100000100000a00060008021100000100000a0006000802110000010000"], 0x68}, 0x1, 0x0, 0x0, 0x4040808}, 0x0)
setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r4, 0x3ff}, 0x8) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc020660b, &(0x7f0000000140)) (async)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0xb630}}, './file0\x00'})

[  279.155937] misc userio: Begin command sent, but we're already running
[  279.158515] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  279.158521] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000
[  279.158526] R13: 0000000020005a00 R14: 0000000000000000 R15: 0000000020006080
[  279.229912] FAULT_INJECTION: forcing a failure.
[  279.229912] name failslab, interval 1, probability 0, space 0, times 0
[  279.274612] misc userio: Begin command sent, but we're already running
[  279.295913] CPU: 1 PID: 17054 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  279.349438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  279.358793] Call Trace:
[  279.361380]  dump_stack+0x1b2/0x281
[  279.365026]  should_fail.cold+0x10a/0x149
[  279.369238]  should_failslab+0xd6/0x130
[  279.373235]  kmem_cache_alloc+0x28e/0x3c0
[  279.377380]  __kernfs_new_node+0x6f/0x470
[  279.381523]  kernfs_new_node+0x7b/0xe0
[  279.385405]  __kernfs_create_file+0x3d/0x320
[  279.389807]  sysfs_add_file_mode_ns+0x1e1/0x450
[  279.394471]  ? kernfs_create_dir_ns+0x171/0x200
[  279.399134]  internal_create_group+0x22b/0x710
[  279.403712]  lo_ioctl+0x1137/0x1cd0
[  279.407330]  ? loop_set_status64+0xe0/0xe0
[  279.411556]  blkdev_ioctl+0x540/0x1830
[  279.415433]  ? blkpg_ioctl+0x8d0/0x8d0
[  279.419313]  ? trace_hardirqs_on+0x10/0x10
[  279.423550]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  279.428644]  ? debug_check_no_obj_freed+0x2c0/0x680
[  279.433654]  block_ioctl+0xd9/0x120
[  279.437269]  ? blkdev_fallocate+0x3a0/0x3a0
[  279.441579]  do_vfs_ioctl+0x75a/0xff0
[  279.445369]  ? lock_acquire+0x170/0x3f0
[  279.449333]  ? ioctl_preallocate+0x1a0/0x1a0
[  279.453738]  ? __fget+0x265/0x3e0
[  279.457183]  ? do_vfs_ioctl+0xff0/0xff0
[  279.461147]  ? security_file_ioctl+0x83/0xb0
[  279.465547]  SyS_ioctl+0x7f/0xb0
[  279.468903]  ? do_vfs_ioctl+0xff0/0xff0
[  279.472871]  do_syscall_64+0x1d5/0x640
[  279.476757]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  279.481951] RIP: 0033:0x7faf49caafc7
[  279.485651] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
12:08:45 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 3)

[  279.493357] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  279.500624] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  279.507888] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  279.515241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  279.522507] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  279.541039] misc userio: Begin command sent, but we're already running
[  279.558379] misc userio: Begin command sent, but we're already running
[  279.579327] misc userio: Begin command sent, but we're already running
[  279.595979] misc userio: Begin command sent, but we're already running
[  279.602519] FAULT_INJECTION: forcing a failure.
[  279.602519] name failslab, interval 1, probability 0, space 0, times 0
[  279.604543] misc userio: Begin command sent, but we're already running
[  279.638137] CPU: 1 PID: 17071 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  279.646048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  279.655409] Call Trace:
[  279.658007]  dump_stack+0x1b2/0x281
[  279.661644]  should_fail.cold+0x10a/0x149
[  279.662506] vxfs: WRONG superblock magic 00000000 at 1
[  279.665799]  should_failslab+0xd6/0x130
[  279.665812]  kmem_cache_alloc+0x28e/0x3c0
[  279.665824]  ? shmem_destroy_callback+0xa0/0xa0
[  279.665832]  shmem_alloc_inode+0x18/0x40
[  279.665839]  ? shmem_destroy_callback+0xa0/0xa0
[  279.665847]  alloc_inode+0x5d/0x170
[  279.665856]  new_inode+0x1d/0xf0
[  279.665864]  shmem_get_inode+0x8b/0x890
[  279.665876]  __shmem_file_setup.part.0+0x104/0x3c0
[  279.665887]  ? shmem_create+0x30/0x30
[  279.671513] vxfs: WRONG superblock magic 00000000 at 8
[  279.675116]  ? __alloc_fd+0x1be/0x490
[  279.675135]  SyS_memfd_create+0x1fc/0x3c0
[  279.675146]  ? shmem_fcntl+0x120/0x120
[  279.675156]  ? __do_page_fault+0x159/0xad0
[  279.675164]  ? do_syscall_64+0x4c/0x640
[  279.675171]  ? shmem_fcntl+0x120/0x120
[  279.675179]  do_syscall_64+0x1d5/0x640
[  279.675194]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  279.675201] RIP: 0033:0x7f5c30cee209
[  279.675205] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  279.675215] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cee209
[  279.675220] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f5c30d4729c
[  279.675225] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  279.675230] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000
[  279.675234] R13: 0000000020005a00 R14: 0000000000000000 R15: 0000000020006080
[  279.799328] vxfs: can't find superblock.
12:08:46 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 4)

12:08:46 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x8880, 0x0) (async)
r2 = socket(0x2, 0x80805, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) (async)
r3 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r4=>0x0}, &(0x7f0000000040)=0x8)
setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, r4}, 0x10)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r4, 0x4)
r5 = socket$nl_generic(0x10, 0x3, 0x10) (async)
r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
sendmsg$NL80211_CMD_GET_WOWLAN(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x2}, @val={0x8}, @void}}}, 0x24}}, 0x0) (async)
sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000428bd7000ffdbdf25150000000c009900070000002b0000000a001a0008021100000000000a00060008021100000000000a00060008021100000000000a00060008021100000100000a00060008021100000100000a0006000802110000010000"], 0x68}, 0x1, 0x0, 0x0, 0x4040808}, 0x0) (async)
setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r4, 0x3ff}, 0x8) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc020660b, &(0x7f0000000140)) (async)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0xb630}}, './file0\x00'})

12:08:46 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 12)

12:08:46 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xb)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x6, 0x9, 0x1, 0x9, 0x0, 0x5, 0x10500, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0xfff}, 0x16299, 0x8, 0x4, 0x8, 0x2a, 0x2, 0x1, 0x0, 0x0, 0x0, 0x621}, 0x0, 0xe, 0xffffffffffffffff, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
r1 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x0)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000140)={0x0, 0x2}, 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f00000000c0)={0x2, 0x9}, 0x2)

12:08:46 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe5bdc9, 0x12f, 0x80000003, 0x2, 0x6e6f, 0x80000001, 0x5, 0x0, 0x70, 0x0, 0x7}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r0, 0x0, 0x3, &(0x7f0000000000)='#\\\x00'}, 0x30)
io_setup(0x3f, &(0x7f0000000140)=<r3=>0x0)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
gettid() (async)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb) (async)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe5bdc9, 0x12f, 0x80000003, 0x2, 0x6e6f, 0x80000001, 0x5, 0x0, 0x70, 0x0, 0x7}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) (async)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r0, 0x0, 0x3, &(0x7f0000000000)='#\\\x00'}, 0x30) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)

12:08:46 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000000)={0x2, 0x68}, 0x2) (async)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2) (async)
ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f0000000140))
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:08:46 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xb)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x6, 0x9, 0x1, 0x9, 0x0, 0x5, 0x10500, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0xfff}, 0x16299, 0x8, 0x4, 0x8, 0x2a, 0x2, 0x1, 0x0, 0x0, 0x0, 0x621}, 0x0, 0xe, 0xffffffffffffffff, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
r1 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x0)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000140)={0x0, 0x2}, 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f00000000c0)={0x2, 0x9}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x6, 0x9, 0x1, 0x9, 0x0, 0x5, 0x10500, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0xfff}, 0x16299, 0x8, 0x4, 0x8, 0x2a, 0x2, 0x1, 0x0, 0x0, 0x0, 0x621}, 0x0, 0xe, 0xffffffffffffffff, 0x2) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x0) (async)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000140)={0x0, 0x2}, 0x2) (async)
write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f00000000c0)={0x2, 0x9}, 0x2) (async)

[  280.237386] FAULT_INJECTION: forcing a failure.
[  280.237386] name failslab, interval 1, probability 0, space 0, times 0
[  280.272317] FAULT_INJECTION: forcing a failure.
[  280.272317] name failslab, interval 1, probability 0, space 0, times 0
[  280.274831] CPU: 1 PID: 17097 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  280.291402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  280.300840] Call Trace:
[  280.303419]  dump_stack+0x1b2/0x281
[  280.307035]  should_fail.cold+0x10a/0x149
[  280.311171]  should_failslab+0xd6/0x130
[  280.315136]  kmem_cache_alloc+0x28e/0x3c0
[  280.319274]  get_empty_filp+0x86/0x3f0
[  280.323152]  alloc_file+0x23/0x440
[  280.326676]  __shmem_file_setup.part.0+0x198/0x3c0
[  280.331586]  ? shmem_create+0x30/0x30
[  280.335366]  ? __alloc_fd+0x1be/0x490
[  280.339156]  SyS_memfd_create+0x1fc/0x3c0
[  280.343291]  ? shmem_fcntl+0x120/0x120
[  280.347160]  ? __do_page_fault+0x159/0xad0
[  280.351377]  ? do_syscall_64+0x4c/0x640
[  280.355332]  ? shmem_fcntl+0x120/0x120
[  280.359202]  do_syscall_64+0x1d5/0x640
[  280.363104]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  280.368286] RIP: 0033:0x7f5c30cee209
[  280.371988] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  280.379685] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cee209
[  280.386942] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f5c30d4729c
[  280.394196] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  280.401450] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000
[  280.408829] R13: 0000000020005a00 R14: 0000000000000000 R15: 0000000020006080
[  280.416112] CPU: 0 PID: 17100 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  280.423995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  280.433357] Call Trace:
[  280.435947]  dump_stack+0x1b2/0x281
[  280.439581]  should_fail.cold+0x10a/0x149
[  280.443737]  should_failslab+0xd6/0x130
[  280.447717]  kmem_cache_alloc+0x28e/0x3c0
[  280.451875]  __kernfs_new_node+0x6f/0x470
[  280.456041]  kernfs_new_node+0x7b/0xe0
[  280.459929]  __kernfs_create_file+0x3d/0x320
[  280.464338]  sysfs_add_file_mode_ns+0x1e1/0x450
[  280.469006]  ? kernfs_create_dir_ns+0x171/0x200
[  280.473675]  internal_create_group+0x22b/0x710
[  280.478259]  lo_ioctl+0x1137/0x1cd0
[  280.481891]  ? loop_set_status64+0xe0/0xe0
[  280.486128]  blkdev_ioctl+0x540/0x1830
[  280.490017]  ? blkpg_ioctl+0x8d0/0x8d0
[  280.493991]  ? trace_hardirqs_on+0x10/0x10
[  280.498229]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  280.503335]  ? debug_check_no_obj_freed+0x2c0/0x680
[  280.508355]  block_ioctl+0xd9/0x120
[  280.511983]  ? blkdev_fallocate+0x3a0/0x3a0
[  280.516316]  do_vfs_ioctl+0x75a/0xff0
[  280.520128]  ? lock_acquire+0x170/0x3f0
[  280.524109]  ? ioctl_preallocate+0x1a0/0x1a0
[  280.528520]  ? __fget+0x265/0x3e0
[  280.531972]  ? do_vfs_ioctl+0xff0/0xff0
[  280.535936]  ? security_file_ioctl+0x83/0xb0
[  280.540363]  SyS_ioctl+0x7f/0xb0
[  280.543805]  ? do_vfs_ioctl+0xff0/0xff0
[  280.547767]  do_syscall_64+0x1d5/0x640
[  280.551739]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  280.556917] RIP: 0033:0x7faf49caafc7
[  280.560613] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  280.568317] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  280.575571] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
12:08:46 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000180))
perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x9, 0x0, 0x8f, 0x72, 0x0, 0x7, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x8, 0x400}, 0x800, 0x2, 0x8001, 0x3, 0x1, 0x6, 0x5, 0x0, 0x92, 0x0, 0x7fffffff}, r1, 0x0, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='%+#+\x00')

12:08:46 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 5)

12:08:47 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x6, 0x9, 0x1, 0x9, 0x0, 0x5, 0x10500, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0xfff}, 0x16299, 0x8, 0x4, 0x8, 0x2a, 0x2, 0x1, 0x0, 0x0, 0x0, 0x621}, 0x0, 0xe, 0xffffffffffffffff, 0x2) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
r1 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x0)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000140)={0x0, 0x2}, 0x2) (async)
write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f00000000c0)={0x2, 0x9}, 0x2)

[  280.582861] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  280.590129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  280.597382] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  280.658114] FAULT_INJECTION: forcing a failure.
[  280.658114] name failslab, interval 1, probability 0, space 0, times 0
[  280.673107] CPU: 0 PID: 17142 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  280.681013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  280.690368] Call Trace:
[  280.692957]  dump_stack+0x1b2/0x281
[  280.696580]  should_fail.cold+0x10a/0x149
[  280.700724]  should_failslab+0xd6/0x130
[  280.704691]  kmem_cache_alloc_trace+0x29a/0x3d0
[  280.709381]  apparmor_file_alloc_security+0x129/0x800
[  280.714573]  security_file_alloc+0x66/0xa0
[  280.718802]  ? selinux_is_enabled+0x5/0x50
[  280.723036]  get_empty_filp+0x16b/0x3f0
[  280.727004]  alloc_file+0x23/0x440
[  280.730537]  __shmem_file_setup.part.0+0x198/0x3c0
[  280.735461]  ? shmem_create+0x30/0x30
[  280.739251]  ? __alloc_fd+0x1be/0x490
[  280.743048]  SyS_memfd_create+0x1fc/0x3c0
[  280.747187]  ? shmem_fcntl+0x120/0x120
[  280.751061]  ? __do_page_fault+0x159/0xad0
[  280.755295]  ? do_syscall_64+0x4c/0x640
[  280.759259]  ? shmem_fcntl+0x120/0x120
[  280.763235]  do_syscall_64+0x1d5/0x640
[  280.767124]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  280.772305] RIP: 0033:0x7f5c30cee209
[  280.776017] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  280.783718] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cee209
[  280.790985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f5c30d4729c
[  280.798243] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007f5c2f6631d0
12:08:47 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe5bdc9, 0x12f, 0x80000003, 0x2, 0x6e6f, 0x80000001, 0x5, 0x0, 0x70, 0x0, 0x7}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r0, 0x0, 0x3, &(0x7f0000000000)='#\\\x00'}, 0x30) (async)
io_setup(0x3f, &(0x7f0000000140)=<r3=>0x0)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:47 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9004}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x81}, 0x2)

12:08:47 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb) (async)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000180)) (async)
perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x9, 0x0, 0x8f, 0x72, 0x0, 0x7, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x8, 0x400}, 0x800, 0x2, 0x8001, 0x3, 0x1, 0x6, 0x5, 0x0, 0x92, 0x0, 0x7fffffff}, r1, 0x0, r3, 0x0) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='%+#+\x00')

[  280.805502] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000
[  280.812770] R13: 0000000020005a00 R14: 0000000000000000 R15: 0000000020006080
12:08:47 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 6)

12:08:47 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9004}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x81}, 0x2)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x81}, 0x2) (async)

[  280.881341] vxfs: WRONG superblock magic 00000000 at 1
[  280.890589] FAULT_INJECTION: forcing a failure.
[  280.890589] name failslab, interval 1, probability 0, space 0, times 0
[  280.914066] vxfs: WRONG superblock magic 00000000 at 8
[  280.920391] CPU: 1 PID: 17156 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  280.928286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  280.931833] vxfs: can't find superblock.
[  280.937637] Call Trace:
[  280.937655]  dump_stack+0x1b2/0x281
[  280.937673]  should_fail.cold+0x10a/0x149
[  280.937689]  should_failslab+0xd6/0x130
[  280.937702]  kmem_cache_alloc+0x28e/0x3c0
[  280.937717]  getname_flags+0xc8/0x550
[  280.937732]  do_sys_open+0x1ce/0x410
[  280.967710]  ? filp_open+0x60/0x60
[  280.971253]  ? SyS_pwrite64+0xca/0x140
[  280.975189]  ? do_syscall_64+0x4c/0x640
[  280.979166]  ? SyS_open+0x30/0x30
[  280.982622]  do_syscall_64+0x1d5/0x640
[  280.986521]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  280.991705] RIP: 0033:0x7f5c30ca1124
[  280.995407] RSP: 002b:00007f5c2f662eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  281.003112] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30ca1124
[  281.010378] RDX: 0000000000000002 RSI: 00007f5c2f662fe0 RDI: 00000000ffffff9c
[  281.017663] RBP: 00007f5c2f662fe0 R08: 0000000000000000 R09: 00007f5c2f6631d0
12:08:47 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 13)

12:08:47 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$vcsn(&(0x7f0000000180), 0x1, 0x800)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xf0, 0x4, 0x3f, 0xf8, 0x0, 0x1, 0x20000, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xde4, 0x4, @perf_config_ext={0x12d0bd8d, 0x1}, 0x0, 0x4, 0xff, 0x1, 0x9, 0x9, 0xfff, 0x0, 0xfffeffff, 0x0, 0xd6}, 0x0, 0x4, r0, 0x5)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x8, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
io_setup(0x80000001, &(0x7f0000000000))

[  281.025017] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[  281.032319] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  281.100174] FAULT_INJECTION: forcing a failure.
[  281.100174] name failslab, interval 1, probability 0, space 0, times 0
[  281.112713] CPU: 1 PID: 17180 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  281.120601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  281.129951] Call Trace:
[  281.132576]  dump_stack+0x1b2/0x281
[  281.136208]  should_fail.cold+0x10a/0x149
[  281.140363]  should_failslab+0xd6/0x130
[  281.144345]  kmem_cache_alloc+0x28e/0x3c0
[  281.148497]  __kernfs_new_node+0x6f/0x470
[  281.152652]  kernfs_new_node+0x7b/0xe0
[  281.156543]  __kernfs_create_file+0x3d/0x320
[  281.160951]  sysfs_add_file_mode_ns+0x1e1/0x450
[  281.165617]  ? kernfs_create_dir_ns+0x171/0x200
[  281.170301]  internal_create_group+0x22b/0x710
[  281.174875]  lo_ioctl+0x1137/0x1cd0
[  281.178485]  ? loop_set_status64+0xe0/0xe0
[  281.182714]  blkdev_ioctl+0x540/0x1830
[  281.186580]  ? blkpg_ioctl+0x8d0/0x8d0
[  281.190445]  ? trace_hardirqs_on+0x10/0x10
[  281.194674]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  281.199803]  ? debug_check_no_obj_freed+0x2c0/0x680
[  281.204895]  block_ioctl+0xd9/0x120
[  281.208507]  ? blkdev_fallocate+0x3a0/0x3a0
[  281.212806]  do_vfs_ioctl+0x75a/0xff0
[  281.216584]  ? lock_acquire+0x170/0x3f0
[  281.220535]  ? ioctl_preallocate+0x1a0/0x1a0
[  281.224921]  ? __fget+0x265/0x3e0
[  281.228348]  ? do_vfs_ioctl+0xff0/0xff0
[  281.232311]  ? security_file_ioctl+0x83/0xb0
[  281.236703]  SyS_ioctl+0x7f/0xb0
[  281.240045]  ? do_vfs_ioctl+0xff0/0xff0
[  281.243996]  do_syscall_64+0x1d5/0x640
[  281.247862]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  281.253029] RIP: 0033:0x7faf49caafc7
[  281.256720] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  281.264405] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  281.271653] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  281.278905] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  281.286149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  281.293401] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
12:08:47 executing program 1:
r0 = syz_open_dev$audion(&(0x7f0000000000), 0x5b4, 0x1)
write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/195, 0xc3}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000000440)=""/77, 0x4d}], 0x4, 0xffffffff, 0x4)

12:08:47 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 7)

12:08:47 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000180)) (async)
perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x9, 0x0, 0x8f, 0x72, 0x0, 0x7, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x8, 0x400}, 0x800, 0x2, 0x8001, 0x3, 0x1, 0x6, 0x5, 0x0, 0x92, 0x0, 0x7fffffff}, r1, 0x0, r3, 0x0) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='%+#+\x00')

12:08:47 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (rerun: 32)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async, rerun: 32)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x81}, 0x2) (rerun: 32)

12:08:47 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$vcsn(&(0x7f0000000180), 0x1, 0x800)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xf0, 0x4, 0x3f, 0xf8, 0x0, 0x1, 0x20000, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xde4, 0x4, @perf_config_ext={0x12d0bd8d, 0x1}, 0x0, 0x4, 0xff, 0x1, 0x9, 0x9, 0xfff, 0x0, 0xfffeffff, 0x0, 0xd6}, 0x0, 0x4, r0, 0x5) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x8, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)
io_setup(0x80000001, &(0x7f0000000000))

12:08:47 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 14)

[  281.304742] vxfs: WRONG superblock magic 00000000 at 1
[  281.316235] vxfs: WRONG superblock magic 00000000 at 8
[  281.340061] vxfs: can't find superblock.
12:08:47 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0xc1, 0x1, 0xe1, 0x0, 0x5, 0x848a0, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0xa00, 0x73952862, 0x16ee, 0x2, 0xffffffffffffffff, 0xffffffe0, 0x2, 0x0, 0x7ff, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x6, r0, 0x0)
r2 = dup(r1)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x0, 0x7f, 0x81, 0x0, 0xf94, 0x1000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x9e}, 0x14000, 0x401, 0xfffffffe, 0x8, 0xe9b3, 0x8, 0x0, 0x0, 0x3, 0x0, 0x65}, 0xffffffffffffffff, 0xc, r2, 0xb)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  281.376826] FAULT_INJECTION: forcing a failure.
[  281.376826] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  281.388669] CPU: 0 PID: 17197 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
12:08:47 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=<r1=>0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x9, 0x6, 0x5, 0x81, 0x0, 0xffffffff, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfac}, 0x40, 0x8, 0x5, 0x2, 0xfffffffffffffffc, 0x4, 0x1000, 0x0, 0x1, 0x0, 0x593}, r1, 0xb, 0xffffffffffffffff, 0x2)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
fcntl$setstatus(r0, 0x4, 0x4400)

[  281.388680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
12:08:47 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0xc1, 0x1, 0xe1, 0x0, 0x5, 0x848a0, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0xa00, 0x73952862, 0x16ee, 0x2, 0xffffffffffffffff, 0xffffffe0, 0x2, 0x0, 0x7ff, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x6, r0, 0x0)
r2 = dup(r1)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x0, 0x7f, 0x81, 0x0, 0xf94, 0x1000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x9e}, 0x14000, 0x401, 0xfffffffe, 0x8, 0xe9b3, 0x8, 0x0, 0x0, 0x3, 0x0, 0x65}, 0xffffffffffffffff, 0xc, r2, 0xb) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:08:47 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=<r1=>0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x9, 0x6, 0x5, 0x81, 0x0, 0xffffffff, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfac}, 0x40, 0x8, 0x5, 0x2, 0xfffffffffffffffc, 0x4, 0x1000, 0x0, 0x1, 0x0, 0x593}, r1, 0xb, 0xffffffffffffffff, 0x2)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
fcntl$setstatus(r0, 0x4, 0x4400)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) (async)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x9, 0x6, 0x5, 0x81, 0x0, 0xffffffff, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfac}, 0x40, 0x8, 0x5, 0x2, 0xfffffffffffffffc, 0x4, 0x1000, 0x0, 0x1, 0x0, 0x593}, r1, 0xb, 0xffffffffffffffff, 0x2) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
fcntl$setstatus(r0, 0x4, 0x4400) (async)

[  281.388685] Call Trace:
[  281.388700]  dump_stack+0x1b2/0x281
[  281.388716]  should_fail.cold+0x10a/0x149
[  281.388732]  __alloc_pages_nodemask+0x22c/0x2720
[  281.388741]  ? check_preemption_disabled+0x35/0x240
[  281.388754]  ? perf_trace_lock+0xf7/0x490
[  281.388766]  ? __lock_acquire+0x5fc/0x3f20
12:08:47 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 8)

[  281.388784]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  281.388802]  ? perf_trace_lock+0xf7/0x490
[  281.388815]  ? perf_trace_lock_acquire+0x510/0x510
[  281.388832]  cache_grow_begin+0x91/0x700
[  281.388840]  ? fs_reclaim_release+0xd0/0x110
[  281.388850]  ? check_preemption_disabled+0x35/0x240
[  281.388862]  cache_alloc_refill+0x273/0x350
[  281.388877]  kmem_cache_alloc+0x333/0x3c0
[  281.388890]  getname_flags+0xc8/0x550
[  281.388902]  do_sys_open+0x1ce/0x410
[  281.388913]  ? filp_open+0x60/0x60
[  281.388920]  ? SyS_pwrite64+0xca/0x140
[  281.388931]  ? do_syscall_64+0x4c/0x640
[  281.388938]  ? SyS_open+0x30/0x30
[  281.388948]  do_syscall_64+0x1d5/0x640
[  281.388964]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  281.388971] RIP: 0033:0x7f5c30ca1124
[  281.388976] RSP: 002b:00007f5c2f662eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  281.388986] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30ca1124
[  281.388991] RDX: 0000000000000002 RSI: 00007f5c2f662fe0 RDI: 00000000ffffff9c
[  281.388996] RBP: 00007f5c2f662fe0 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  281.389000] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[  281.389005] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  281.463456] vxfs: WRONG superblock magic 00000000 at 1
[  281.464027] vxfs: WRONG superblock magic 00000000 at 8
[  281.464032] vxfs: can't find superblock.
[  281.469215] FAULT_INJECTION: forcing a failure.
[  281.469215] name failslab, interval 1, probability 0, space 0, times 0
[  281.469298] CPU: 0 PID: 17218 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  281.469302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  281.469305] Call Trace:
[  281.469316]  dump_stack+0x1b2/0x281
[  281.469328]  should_fail.cold+0x10a/0x149
[  281.469340]  should_failslab+0xd6/0x130
[  281.469350]  kmem_cache_alloc+0x40/0x3c0
[  281.469363]  radix_tree_node_alloc.constprop.0+0x1b0/0x2f0
[  281.469372]  idr_get_free_cmn+0x595/0x8d0
[  281.469386]  idr_alloc_cmn+0xe8/0x1e0
[  281.469395]  ? __fprop_inc_percpu_max+0x1d0/0x1d0
[  281.469402]  ? kernfs_add_one+0x4c/0x3a0
12:08:48 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=<r1=>0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x9, 0x6, 0x5, 0x81, 0x0, 0xffffffff, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfac}, 0x40, 0x8, 0x5, 0x2, 0xfffffffffffffffc, 0x4, 0x1000, 0x0, 0x1, 0x0, 0x593}, r1, 0xb, 0xffffffffffffffff, 0x2) (async)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
fcntl$setstatus(r0, 0x4, 0x4400)

[  281.469411]  ? fs_reclaim_release+0xd0/0x110
[  281.469420]  idr_alloc_cyclic+0xc2/0x1d0
[  281.469429]  ? idr_alloc_cmn+0x1e0/0x1e0
[  281.469435]  ? __radix_tree_preload+0x1c3/0x250
[  281.469445]  __kernfs_new_node+0xaf/0x470
[  281.469455]  kernfs_new_node+0x7b/0xe0
[  281.469463]  __kernfs_create_file+0x3d/0x320
[  281.469471]  sysfs_add_file_mode_ns+0x1e1/0x450
[  281.469478]  ? kernfs_create_dir_ns+0x171/0x200
[  281.469486]  internal_create_group+0x22b/0x710
[  281.469497]  lo_ioctl+0x1137/0x1cd0
[  281.469506]  ? loop_set_status64+0xe0/0xe0
[  281.469515]  blkdev_ioctl+0x540/0x1830
[  281.469523]  ? blkpg_ioctl+0x8d0/0x8d0
[  281.469530]  ? trace_hardirqs_on+0x10/0x10
[  281.469540]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  281.469547]  ? debug_check_no_obj_freed+0x2c0/0x680
[  281.469557]  block_ioctl+0xd9/0x120
[  281.469563]  ? blkdev_fallocate+0x3a0/0x3a0
[  281.469571]  do_vfs_ioctl+0x75a/0xff0
[  281.469578]  ? lock_acquire+0x170/0x3f0
[  281.469585]  ? ioctl_preallocate+0x1a0/0x1a0
[  281.469594]  ? __fget+0x265/0x3e0
[  281.469602]  ? do_vfs_ioctl+0xff0/0xff0
[  281.469610]  ? security_file_ioctl+0x83/0xb0
[  281.469619]  SyS_ioctl+0x7f/0xb0
[  281.469626]  ? do_vfs_ioctl+0xff0/0xff0
[  281.469637]  do_syscall_64+0x1d5/0x640
[  281.469649]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  281.469655] RIP: 0033:0x7faf49caafc7
[  281.469659] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  281.469666] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  281.469670] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  281.469676] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  281.469681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  281.469687] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  281.479105] vxfs: WRONG superblock magic 00000000 at 1
[  281.492851] vxfs: WRONG superblock magic 00000000 at 8
[  281.564076] FAULT_INJECTION: forcing a failure.
[  281.564076] name failslab, interval 1, probability 0, space 0, times 0
[  281.663455] vxfs: can't find superblock.
[  281.700958] CPU: 1 PID: 17235 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  281.912362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  281.921705] Call Trace:
[  281.924282]  dump_stack+0x1b2/0x281
[  281.927895]  should_fail.cold+0x10a/0x149
[  281.932036]  should_failslab+0xd6/0x130
[  281.936009]  kmem_cache_alloc+0x28e/0x3c0
[  281.940160]  get_empty_filp+0x86/0x3f0
[  281.944032]  path_openat+0x84/0x2970
[  281.947735]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  281.952576]  ? path_lookupat+0x780/0x780
[  281.956617]  ? trace_hardirqs_on+0x10/0x10
[  281.960835]  do_filp_open+0x179/0x3c0
[  281.964619]  ? may_open_dev+0xe0/0xe0
[  281.968397]  ? __alloc_fd+0x1be/0x490
[  281.972176]  ? lock_downgrade+0x740/0x740
[  281.976323]  ? do_raw_spin_unlock+0x164/0x220
[  281.980798]  ? _raw_spin_unlock+0x29/0x40
[  281.984924]  ? __alloc_fd+0x1be/0x490
[  281.988719]  do_sys_open+0x296/0x410
[  281.992512]  ? filp_open+0x60/0x60
[  281.996038]  ? SyS_pwrite64+0xca/0x140
[  281.999906]  ? do_syscall_64+0x4c/0x640
[  282.003956]  ? SyS_open+0x30/0x30
[  282.007402]  do_syscall_64+0x1d5/0x640
[  282.011294]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  282.016472] RIP: 0033:0x7f5c30ca1124
[  282.020159] RSP: 002b:00007f5c2f662eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  282.027851] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30ca1124
[  282.035096] RDX: 0000000000000002 RSI: 00007f5c2f662fe0 RDI: 00000000ffffff9c
[  282.042343] RBP: 00007f5c2f662fe0 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  282.049593] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[  282.056850] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:08:48 executing program 1:
r0 = syz_open_dev$audion(&(0x7f0000000000), 0x5b4, 0x1)
write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/195, 0xc3}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000000440)=""/77, 0x4d}], 0x4, 0xffffffff, 0x4)

12:08:48 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0xc1, 0x1, 0xe1, 0x0, 0x5, 0x848a0, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0xa00, 0x73952862, 0x16ee, 0x2, 0xffffffffffffffff, 0xffffffe0, 0x2, 0x0, 0x7ff, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x6, r0, 0x0)
r2 = dup(r1)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x0, 0x7f, 0x81, 0x0, 0xf94, 0x1000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x9e}, 0x14000, 0x401, 0xfffffffe, 0x8, 0xe9b3, 0x8, 0x0, 0x0, 0x3, 0x0, 0x65}, 0xffffffffffffffff, 0xc, r2, 0xb)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0xc1, 0x1, 0xe1, 0x0, 0x5, 0x848a0, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0xa00, 0x73952862, 0x16ee, 0x2, 0xffffffffffffffff, 0xffffffe0, 0x2, 0x0, 0x7ff, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x6, r0, 0x0) (async)
dup(r1) (async)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x0, 0x7f, 0x81, 0x0, 0xf94, 0x1000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x9e}, 0x14000, 0x401, 0xfffffffe, 0x8, 0xe9b3, 0x8, 0x0, 0x0, 0x3, 0x0, 0x65}, 0xffffffffffffffff, 0xc, r2, 0xb) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

12:08:48 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 9)

12:08:48 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x6)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3e, 0x3b, 0x7f, 0x0, 0x0, 0x0, 0x60126, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa05f, 0x0, @perf_config_ext={0x8001, 0x4}, 0x80, 0x1, 0x92, 0x3, 0x5, 0x400, 0xabab, 0x0, 0x3f, 0x0, 0x66e}, 0x0, 0xf, r0, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:48 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 15)

12:08:48 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$vcsn(&(0x7f0000000180), 0x1, 0x800)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xf0, 0x4, 0x3f, 0xf8, 0x0, 0x1, 0x20000, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xde4, 0x4, @perf_config_ext={0x12d0bd8d, 0x1}, 0x0, 0x4, 0xff, 0x1, 0x9, 0x9, 0xfff, 0x0, 0xfffeffff, 0x0, 0xd6}, 0x0, 0x4, r0, 0x5)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x8, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
io_setup(0x80000001, &(0x7f0000000000))
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
syz_open_dev$vcsn(&(0x7f0000000180), 0x1, 0x800) (async)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xf0, 0x4, 0x3f, 0xf8, 0x0, 0x1, 0x20000, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xde4, 0x4, @perf_config_ext={0x12d0bd8d, 0x1}, 0x0, 0x4, 0xff, 0x1, 0x9, 0x9, 0xfff, 0x0, 0xfffeffff, 0x0, 0xd6}, 0x0, 0x4, r0, 0x5) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x8, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)
io_setup(0x80000001, &(0x7f0000000000)) (async)

12:08:48 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x6)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3e, 0x3b, 0x7f, 0x0, 0x0, 0x0, 0x60126, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa05f, 0x0, @perf_config_ext={0x8001, 0x4}, 0x80, 0x1, 0x92, 0x3, 0x5, 0x400, 0xabab, 0x0, 0x3f, 0x0, 0x66e}, 0x0, 0xf, r0, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x6) (async)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3e, 0x3b, 0x7f, 0x0, 0x0, 0x0, 0x60126, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa05f, 0x0, @perf_config_ext={0x8001, 0x4}, 0x80, 0x1, 0x92, 0x3, 0x5, 0x400, 0xabab, 0x0, 0x3f, 0x0, 0x66e}, 0x0, 0xf, r0, 0x2) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

12:08:48 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=<r3=>0x0)
perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0xe0, 0x20, 0x7f, 0x5, 0x0, 0x9, 0x80100, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x1, 0x1ff}, 0x4, 0x0, 0x7fff, 0x0, 0x8000000000000000, 0x9, 0xfff, 0x0, 0x400, 0x0, 0x4}, r3, 0x6, 0xffffffffffffffff, 0xb)
perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x8, 0xaf, 0x6, 0x1, 0x0, 0x3, 0x1901, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x8}, 0x1082e, 0x1000, 0xffff, 0x0, 0xefbc, 0x7fffffff, 0x1f, 0x0, 0x4, 0x0, 0x2}, r1, 0x0, r0, 0x1)
r4 = openat$mice(0xffffffffffffff9c, &(0x7f00000002c0), 0x400000)
perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xff, 0xa1, 0xff, 0x7, 0x0, 0xff, 0x12000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x184, 0xfffffffffffffff8, 0x4, 0x2, 0xfffffffffffffff9, 0x66e, 0x6, 0x0, 0x20, 0x0, 0x1}, r1, 0x10, r4, 0x3)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  282.254458] FAULT_INJECTION: forcing a failure.
[  282.254458] name failslab, interval 1, probability 0, space 0, times 0
[  282.289472] FAULT_INJECTION: forcing a failure.
[  282.289472] name failslab, interval 1, probability 0, space 0, times 0
[  282.301514] CPU: 1 PID: 17273 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  282.309409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  282.318846] Call Trace:
[  282.321437]  dump_stack+0x1b2/0x281
[  282.325073]  should_fail.cold+0x10a/0x149
[  282.329220]  should_failslab+0xd6/0x130
[  282.333186]  kmem_cache_alloc+0x28e/0x3c0
[  282.337329]  __kernfs_new_node+0x6f/0x470
[  282.341472]  kernfs_new_node+0x7b/0xe0
[  282.345356]  __kernfs_create_file+0x3d/0x320
[  282.349758]  sysfs_add_file_mode_ns+0x1e1/0x450
[  282.354419]  ? kernfs_create_dir_ns+0x171/0x200
[  282.359084]  internal_create_group+0x22b/0x710
[  282.363660]  lo_ioctl+0x1137/0x1cd0
[  282.367285]  ? loop_set_status64+0xe0/0xe0
[  282.371626]  blkdev_ioctl+0x540/0x1830
[  282.375508]  ? blkpg_ioctl+0x8d0/0x8d0
[  282.379390]  ? perf_trace_lock+0xf7/0x490
[  282.383525]  ? perf_trace_lock_acquire+0x510/0x510
[  282.388450]  block_ioctl+0xd9/0x120
[  282.392064]  ? blkdev_fallocate+0x3a0/0x3a0
[  282.396376]  do_vfs_ioctl+0x75a/0xff0
[  282.400173]  ? lock_acquire+0x170/0x3f0
[  282.404145]  ? ioctl_preallocate+0x1a0/0x1a0
[  282.408546]  ? __fget+0x265/0x3e0
[  282.411994]  ? do_vfs_ioctl+0xff0/0xff0
[  282.415968]  ? security_file_ioctl+0x83/0xb0
[  282.420366]  SyS_ioctl+0x7f/0xb0
[  282.423718]  ? do_vfs_ioctl+0xff0/0xff0
[  282.427681]  do_syscall_64+0x1d5/0x640
[  282.431564]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  282.436741] RIP: 0033:0x7faf49caafc7
[  282.440437] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  282.448178] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  282.455436] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  282.462695] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  282.469952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  282.477205] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  282.487816] CPU: 1 PID: 17275 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  282.495709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  282.505055] Call Trace:
[  282.507638]  dump_stack+0x1b2/0x281
[  282.511276]  should_fail.cold+0x10a/0x149
[  282.515427]  should_failslab+0xd6/0x130
[  282.519405]  kmem_cache_alloc_trace+0x29a/0x3d0
[  282.524081]  apparmor_file_alloc_security+0x129/0x800
[  282.529274]  security_file_alloc+0x66/0xa0
[  282.533525]  ? selinux_is_enabled+0x5/0x50
[  282.537774]  get_empty_filp+0x16b/0x3f0
[  282.541739]  path_openat+0x84/0x2970
[  282.545450]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  282.550287]  ? path_lookupat+0x780/0x780
[  282.554338]  ? trace_hardirqs_on+0x10/0x10
[  282.558571]  do_filp_open+0x179/0x3c0
[  282.562356]  ? may_open_dev+0xe0/0xe0
[  282.566147]  ? __alloc_fd+0x1be/0x490
[  282.569948]  ? lock_downgrade+0x740/0x740
[  282.574086]  ? do_raw_spin_unlock+0x164/0x220
[  282.578568]  ? _raw_spin_unlock+0x29/0x40
[  282.582699]  ? __alloc_fd+0x1be/0x490
[  282.586496]  do_sys_open+0x296/0x410
[  282.590204]  ? filp_open+0x60/0x60
[  282.593738]  ? SyS_pwrite64+0xca/0x140
[  282.597617]  ? do_syscall_64+0x4c/0x640
[  282.601586]  ? SyS_open+0x30/0x30
[  282.605028]  do_syscall_64+0x1d5/0x640
[  282.608935]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  282.614121] RIP: 0033:0x7f5c30ca1124
[  282.617824] RSP: 002b:00007f5c2f662eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  282.625520] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30ca1124
[  282.632780] RDX: 0000000000000002 RSI: 00007f5c2f662fe0 RDI: 00000000ffffff9c
[  282.640038] RBP: 00007f5c2f662fe0 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  282.647295] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
12:08:49 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x6) (async, rerun: 64)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3e, 0x3b, 0x7f, 0x0, 0x0, 0x0, 0x60126, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa05f, 0x0, @perf_config_ext={0x8001, 0x4}, 0x80, 0x1, 0x92, 0x3, 0x5, 0x400, 0xabab, 0x0, 0x3f, 0x0, 0x66e}, 0x0, 0xf, r0, 0x2) (async, rerun: 64)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:49 executing program 0:
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:49 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 10)

[  282.654552] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  282.673306] vxfs: WRONG superblock magic 00000000 at 1
12:08:49 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb) (async)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=<r3=>0x0)
perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0xe0, 0x20, 0x7f, 0x5, 0x0, 0x9, 0x80100, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x1, 0x1ff}, 0x4, 0x0, 0x7fff, 0x0, 0x8000000000000000, 0x9, 0xfff, 0x0, 0x400, 0x0, 0x4}, r3, 0x6, 0xffffffffffffffff, 0xb) (async)
perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x8, 0xaf, 0x6, 0x1, 0x0, 0x3, 0x1901, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x8}, 0x1082e, 0x1000, 0xffff, 0x0, 0xefbc, 0x7fffffff, 0x1f, 0x0, 0x4, 0x0, 0x2}, r1, 0x0, r0, 0x1)
r4 = openat$mice(0xffffffffffffff9c, &(0x7f00000002c0), 0x400000)
perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xff, 0xa1, 0xff, 0x7, 0x0, 0xff, 0x12000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x184, 0xfffffffffffffff8, 0x4, 0x2, 0xfffffffffffffff9, 0x66e, 0x6, 0x0, 0x20, 0x0, 0x1}, r1, 0x10, r4, 0x3) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  282.716194] vxfs: WRONG superblock magic 00000000 at 8
[  282.736040] vxfs: can't find superblock.
[  282.752318] FAULT_INJECTION: forcing a failure.
[  282.752318] name failslab, interval 1, probability 0, space 0, times 0
[  282.767702] CPU: 0 PID: 17304 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  282.775609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  282.784963] Call Trace:
[  282.787552]  dump_stack+0x1b2/0x281
[  282.791186]  should_fail.cold+0x10a/0x149
[  282.795343]  should_failslab+0xd6/0x130
[  282.799325]  kmem_cache_alloc_trace+0x29a/0x3d0
[  282.804009]  ? loop_get_status64+0x100/0x100
[  282.808416]  __kthread_create_on_node+0xbe/0x3a0
[  282.813172]  ? kthread_park+0x130/0x130
[  282.817161]  ? loop_get_status64+0x100/0x100
[  282.821573]  kthread_create_on_node+0xa8/0xd0
[  282.826066]  ? __kthread_create_on_node+0x3a0/0x3a0
[  282.831090]  ? __lockdep_init_map+0x100/0x560
[  282.835592]  ? __lockdep_init_map+0x100/0x560
[  282.840076]  lo_ioctl+0xcd9/0x1cd0
[  282.843599]  ? loop_set_status64+0xe0/0xe0
[  282.847817]  blkdev_ioctl+0x540/0x1830
[  282.851687]  ? blkpg_ioctl+0x8d0/0x8d0
[  282.855559]  ? trace_hardirqs_on+0x10/0x10
[  282.859778]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  282.864862]  ? debug_check_no_obj_freed+0x2c0/0x680
[  282.869862]  block_ioctl+0xd9/0x120
[  282.873485]  ? blkdev_fallocate+0x3a0/0x3a0
[  282.877789]  do_vfs_ioctl+0x75a/0xff0
[  282.881571]  ? lock_acquire+0x170/0x3f0
[  282.885528]  ? ioctl_preallocate+0x1a0/0x1a0
[  282.889921]  ? __fget+0x265/0x3e0
[  282.893370]  ? do_vfs_ioctl+0xff0/0xff0
[  282.897324]  ? security_file_ioctl+0x83/0xb0
[  282.901715]  SyS_ioctl+0x7f/0xb0
[  282.905099]  ? do_vfs_ioctl+0xff0/0xff0
[  282.909228]  do_syscall_64+0x1d5/0x640
[  282.913114]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  282.918283] RIP: 0033:0x7f5c30cedfc7
[  282.921986] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  282.929675] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  282.936925] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  282.944173] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  282.951424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  282.958670] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:08:49 executing program 1:
r0 = syz_open_dev$audion(&(0x7f0000000000), 0x5b4, 0x1)
write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/195, 0xc3}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000000440)=""/77, 0x4d}], 0x4, 0xffffffff, 0x4)
syz_open_dev$audion(&(0x7f0000000000), 0x5b4, 0x1) (async)
write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/195, 0xc3}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000000440)=""/77, 0x4d}], 0x4, 0xffffffff, 0x4) (async)

12:08:49 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='/dev/userio\x00')
r2 = accept4$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0)
fcntl$getown(r2, 0x9)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:49 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 11)

12:08:49 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9) (async)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=<r3=>0x0)
perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0xe0, 0x20, 0x7f, 0x5, 0x0, 0x9, 0x80100, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x1, 0x1ff}, 0x4, 0x0, 0x7fff, 0x0, 0x8000000000000000, 0x9, 0xfff, 0x0, 0x400, 0x0, 0x4}, r3, 0x6, 0xffffffffffffffff, 0xb) (async)
perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x8, 0xaf, 0x6, 0x1, 0x0, 0x3, 0x1901, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x8}, 0x1082e, 0x1000, 0xffff, 0x0, 0xefbc, 0x7fffffff, 0x1f, 0x0, 0x4, 0x0, 0x2}, r1, 0x0, r0, 0x1)
r4 = openat$mice(0xffffffffffffff9c, &(0x7f00000002c0), 0x400000)
perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xff, 0xa1, 0xff, 0x7, 0x0, 0xff, 0x12000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x184, 0xfffffffffffffff8, 0x4, 0x2, 0xfffffffffffffff9, 0x66e, 0x6, 0x0, 0x20, 0x0, 0x1}, r1, 0x10, r4, 0x3) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:08:49 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 16)

12:08:49 executing program 0:
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
io_setup(0x3f, &(0x7f0000000140)) (async)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)

12:08:49 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = gettid()
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
getpgid(r0)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r0, 0xa, r1, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0xffffffffffffff72, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x404}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0xc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r0, 0x8, 0xffffffffffffffff, 0x9)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x8001, 0x85000, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x4112, 0x401, 0x8, 0x4, 0x6, 0x8, 0x8, 0x0, 0x1e92, 0x0, 0x100}, r0, 0x0, r2, 0x0)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000200)={{0x1, 0x1, 0x18, <r3=>r1}, './file0\x00'})
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000240)='W:\\:}\xe3+-$*+-^\':)\x00')
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:08:49 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='/dev/userio\x00')
r2 = accept4$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0)
fcntl$getown(r2, 0x9) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  283.140925] FAULT_INJECTION: forcing a failure.
[  283.140925] name failslab, interval 1, probability 0, space 0, times 0
[  283.152802] FAULT_INJECTION: forcing a failure.
[  283.152802] name failslab, interval 1, probability 0, space 0, times 0
[  283.186272] CPU: 0 PID: 17332 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  283.194185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  283.203539] Call Trace:
[  283.206124]  dump_stack+0x1b2/0x281
[  283.209755]  should_fail.cold+0x10a/0x149
[  283.214168]  should_failslab+0xd6/0x130
[  283.218147]  kmem_cache_alloc+0x28e/0x3c0
[  283.222301]  __kernfs_new_node+0x6f/0x470
[  283.226460]  kernfs_new_node+0x7b/0xe0
[  283.230347]  __kernfs_create_file+0x3d/0x320
[  283.234762]  sysfs_add_file_mode_ns+0x1e1/0x450
[  283.239437]  ? kernfs_create_dir_ns+0x171/0x200
[  283.244105]  internal_create_group+0x22b/0x710
[  283.248694]  lo_ioctl+0x1137/0x1cd0
[  283.252327]  ? loop_set_status64+0xe0/0xe0
[  283.256560]  blkdev_ioctl+0x540/0x1830
[  283.260447]  ? blkpg_ioctl+0x8d0/0x8d0
[  283.264329]  ? trace_hardirqs_on+0x10/0x10
[  283.268578]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  283.273682]  ? debug_check_no_obj_freed+0x2c0/0x680
[  283.278704]  block_ioctl+0xd9/0x120
[  283.282330]  ? blkdev_fallocate+0x3a0/0x3a0
[  283.286652]  do_vfs_ioctl+0x75a/0xff0
[  283.290461]  ? lock_acquire+0x170/0x3f0
[  283.294448]  ? ioctl_preallocate+0x1a0/0x1a0
[  283.298950]  ? __fget+0x265/0x3e0
[  283.302409]  ? do_vfs_ioctl+0xff0/0xff0
[  283.306386]  ? security_file_ioctl+0x83/0xb0
[  283.310794]  SyS_ioctl+0x7f/0xb0
[  283.314161]  ? do_vfs_ioctl+0xff0/0xff0
[  283.318137]  do_syscall_64+0x1d5/0x640
[  283.322029]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  283.327206] RIP: 0033:0x7faf49caafc7
12:08:49 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='/dev/userio\x00') (async, rerun: 32)
r2 = accept4$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0) (rerun: 32)
fcntl$getown(r2, 0x9)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  283.330900] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  283.338594] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  283.345856] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  283.353108] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  283.360362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  283.367620] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  283.384232] CPU: 0 PID: 17335 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  283.392114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  283.401459] Call Trace:
[  283.404039]  dump_stack+0x1b2/0x281
[  283.407665]  should_fail.cold+0x10a/0x149
[  283.411801]  should_failslab+0xd6/0x130
[  283.415763]  kmem_cache_alloc+0x28e/0x3c0
[  283.419900]  __kernfs_new_node+0x6f/0x470
[  283.424037]  kernfs_create_dir_ns+0x8c/0x200
[  283.428428]  internal_create_group+0xe9/0x710
[  283.432912]  lo_ioctl+0x1137/0x1cd0
[  283.436530]  ? loop_set_status64+0xe0/0xe0
[  283.440756]  blkdev_ioctl+0x540/0x1830
[  283.444631]  ? blkpg_ioctl+0x8d0/0x8d0
[  283.448507]  ? trace_hardirqs_on+0x10/0x10
[  283.452729]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  283.457823]  ? debug_check_no_obj_freed+0x2c0/0x680
[  283.462829]  block_ioctl+0xd9/0x120
[  283.466437]  ? blkdev_fallocate+0x3a0/0x3a0
[  283.470743]  do_vfs_ioctl+0x75a/0xff0
[  283.474537]  ? lock_acquire+0x170/0x3f0
[  283.478494]  ? ioctl_preallocate+0x1a0/0x1a0
[  283.482890]  ? __fget+0x265/0x3e0
[  283.486327]  ? do_vfs_ioctl+0xff0/0xff0
[  283.490286]  ? security_file_ioctl+0x83/0xb0
[  283.494680]  SyS_ioctl+0x7f/0xb0
[  283.498028]  ? do_vfs_ioctl+0xff0/0xff0
[  283.501987]  do_syscall_64+0x1d5/0x640
[  283.505864]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  283.511034] RIP: 0033:0x7f5c30cedfc7
[  283.514728] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  283.522417] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  283.529681] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
12:08:49 executing program 0:
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  283.536933] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  283.544183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  283.551434] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:08:49 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = gettid()
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
getpgid(r0) (async)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r0, 0xa, r1, 0xb) (async, rerun: 64)
perf_event_open(&(0x7f0000000000)={0x2, 0xffffffffffffff72, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x404}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0xc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r0, 0x8, 0xffffffffffffffff, 0x9) (async)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x8001, 0x85000, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x4112, 0x401, 0x8, 0x4, 0x6, 0x8, 0x8, 0x0, 0x1e92, 0x0, 0x100}, r0, 0x0, r2, 0x0) (async)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000200)={{0x1, 0x1, 0x18, <r3=>r1}, './file0\x00'})
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000240)='W:\\:}\xe3+-$*+-^\':)\x00') (async, rerun: 32)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (rerun: 32)

12:08:50 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv6_deladdr={0x28, 0x15, 0x300, 0x70bd29, 0x25dfdbfe, {0xa, 0x38, 0x3, 0xc8}, [@IFA_TARGET_NETNSID={0x8}, @IFA_TARGET_NETNSID={0x8, 0xa, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004084}, 0xc4)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x5, &(0x7f00000000c0)='\'[#}\x00'}, 0x30)

[  283.604288] vxfs: WRONG superblock magic 00000000 at 1
[  283.610098] vxfs: WRONG superblock magic 00000000 at 8
[  283.622489] vxfs: can't find superblock.
[  283.629808] vxfs: WRONG superblock magic 00000000 at 1
[  283.649233] vxfs: WRONG superblock magic 00000000 at 8
[  283.660609] vxfs: can't find superblock.
12:08:50 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32)
r0 = gettid() (rerun: 32)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
getpgid(r0) (async)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r0, 0xa, r1, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0xffffffffffffff72, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x404}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0xc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r0, 0x8, 0xffffffffffffffff, 0x9)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x8001, 0x85000, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x4112, 0x401, 0x8, 0x4, 0x6, 0x8, 0x8, 0x0, 0x1e92, 0x0, 0x100}, r0, 0x0, r2, 0x0) (async, rerun: 64)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000200)={{0x1, 0x1, 0x18, <r3=>r1}, './file0\x00'}) (rerun: 64)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000240)='W:\\:}\xe3+-$*+-^\':)\x00')
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:08:50 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv6_deladdr={0x28, 0x15, 0x300, 0x70bd29, 0x25dfdbfe, {0xa, 0x38, 0x3, 0xc8}, [@IFA_TARGET_NETNSID={0x8}, @IFA_TARGET_NETNSID={0x8, 0xa, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004084}, 0xc4) (async)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x5, &(0x7f00000000c0)='\'[#}\x00'}, 0x30)

12:08:50 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 12)

12:08:50 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 17)

12:08:50 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2)
preadv(r0, &(0x7f0000000080), 0x0, 0x4000, 0x0)

12:08:50 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x80000000, 0x4, {<r2=>0xffffffffffffffff}, {0xee01}, 0x7, 0x1})
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x8, 0x3f, 0x3, 0x7f, 0x0, 0x7d0c, 0x2d401, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x7, 0x1ff}, 0x10000, 0x9, 0x1f, 0x5, 0x40, 0x1, 0x1, 0x0, 0x1ff, 0x0, 0xffffffffffffffff}, r2, 0x1, r0, 0x5)

[  283.994669] FAULT_INJECTION: forcing a failure.
[  283.994669] name failslab, interval 1, probability 0, space 0, times 0
[  284.006391] FAULT_INJECTION: forcing a failure.
[  284.006391] name failslab, interval 1, probability 0, space 0, times 0
[  284.023061] CPU: 1 PID: 17400 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  284.030960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  284.040319] Call Trace:
[  284.042913]  dump_stack+0x1b2/0x281
[  284.046544]  should_fail.cold+0x10a/0x149
[  284.050699]  should_failslab+0xd6/0x130
[  284.054674]  kmem_cache_alloc+0x28e/0x3c0
[  284.058822]  __kernfs_new_node+0x6f/0x470
[  284.063083]  kernfs_new_node+0x7b/0xe0
[  284.066961]  __kernfs_create_file+0x3d/0x320
[  284.071357]  sysfs_add_file_mode_ns+0x1e1/0x450
[  284.076024]  ? kernfs_create_dir_ns+0x171/0x200
[  284.080688]  internal_create_group+0x22b/0x710
[  284.085270]  lo_ioctl+0x1137/0x1cd0
[  284.088889]  ? loop_set_status64+0xe0/0xe0
[  284.093123]  blkdev_ioctl+0x540/0x1830
[  284.097010]  ? blkpg_ioctl+0x8d0/0x8d0
[  284.100885]  ? trace_hardirqs_on+0x10/0x10
[  284.105122]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  284.110222]  ? debug_check_no_obj_freed+0x2c0/0x680
[  284.115239]  block_ioctl+0xd9/0x120
[  284.118876]  ? blkdev_fallocate+0x3a0/0x3a0
[  284.123185]  do_vfs_ioctl+0x75a/0xff0
[  284.126973]  ? lock_acquire+0x170/0x3f0
[  284.130932]  ? ioctl_preallocate+0x1a0/0x1a0
[  284.135325]  ? __fget+0x265/0x3e0
[  284.138766]  ? do_vfs_ioctl+0xff0/0xff0
[  284.142731]  ? security_file_ioctl+0x83/0xb0
[  284.147480]  SyS_ioctl+0x7f/0xb0
[  284.150834]  ? do_vfs_ioctl+0xff0/0xff0
[  284.154803]  do_syscall_64+0x1d5/0x640
[  284.158690]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  284.163864] RIP: 0033:0x7f5c30cedfc7
[  284.167558] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  284.175255] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  284.182528] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
12:08:50 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2) (async)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2)
preadv(r0, &(0x7f0000000080), 0x0, 0x4000, 0x0)

12:08:50 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async, rerun: 64)
r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (rerun: 64)
sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv6_deladdr={0x28, 0x15, 0x300, 0x70bd29, 0x25dfdbfe, {0xa, 0x38, 0x3, 0xc8}, [@IFA_TARGET_NETNSID={0x8}, @IFA_TARGET_NETNSID={0x8, 0xa, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004084}, 0xc4) (async, rerun: 64)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x5, &(0x7f00000000c0)='\'[#}\x00'}, 0x30) (rerun: 64)

[  284.189781] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  284.197039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  284.204298] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  284.229210] CPU: 0 PID: 17394 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  284.237102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  284.246454] Call Trace:
[  284.249045]  dump_stack+0x1b2/0x281
[  284.252685]  should_fail.cold+0x10a/0x149
[  284.256841]  should_failslab+0xd6/0x130
[  284.260822]  kmem_cache_alloc+0x28e/0x3c0
[  284.264987]  __kernfs_new_node+0x6f/0x470
[  284.267592] vxfs: WRONG superblock magic 00000000 at 1
[  284.269141]  kernfs_new_node+0x7b/0xe0
[  284.269156]  __kernfs_create_file+0x3d/0x320
[  284.269171]  sysfs_add_file_mode_ns+0x1e1/0x450
[  284.269187]  ? kernfs_create_dir_ns+0x171/0x200
[  284.274917] vxfs: WRONG superblock magic 00000000 at 8
[  284.278601]  internal_create_group+0x22b/0x710
[  284.278623]  lo_ioctl+0x1137/0x1cd0
[  284.278638]  ? loop_set_status64+0xe0/0xe0
[  284.278653]  blkdev_ioctl+0x540/0x1830
[  284.283144] vxfs: can't find superblock.
[  284.287705]  ? blkpg_ioctl+0x8d0/0x8d0
[  284.287717]  ? trace_hardirqs_on+0x10/0x10
[  284.287733]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  284.287746]  ? debug_check_no_obj_freed+0x2c0/0x680
[  284.287766]  block_ioctl+0xd9/0x120
[  284.287774]  ? blkdev_fallocate+0x3a0/0x3a0
[  284.287786]  do_vfs_ioctl+0x75a/0xff0
[  284.347878]  ? lock_acquire+0x170/0x3f0
[  284.351864]  ? ioctl_preallocate+0x1a0/0x1a0
[  284.356287]  ? __fget+0x265/0x3e0
[  284.359743]  ? do_vfs_ioctl+0xff0/0xff0
[  284.363717]  ? security_file_ioctl+0x83/0xb0
[  284.368130]  SyS_ioctl+0x7f/0xb0
[  284.371493]  ? do_vfs_ioctl+0xff0/0xff0
[  284.375467]  do_syscall_64+0x1d5/0x640
[  284.379391]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  284.384563] RIP: 0033:0x7faf49caafc7
[  284.388266] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
12:08:50 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2)
preadv(r0, &(0x7f0000000080), 0x0, 0x4000, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2) (async)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2) (async)
preadv(r0, &(0x7f0000000080), 0x0, 0x4000, 0x0) (async)

12:08:50 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x80000000, 0x4, {<r2=>0xffffffffffffffff}, {0xee01}, 0x7, 0x1})
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x8, 0x3f, 0x3, 0x7f, 0x0, 0x7d0c, 0x2d401, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x7, 0x1ff}, 0x10000, 0x9, 0x1f, 0x5, 0x40, 0x1, 0x1, 0x0, 0x1ff, 0x0, 0xffffffffffffffff}, r2, 0x1, r0, 0x5)

12:08:50 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 13)

12:08:50 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x4, 0x6, 0x7, 0x1, 0x0, 0x4, 0x8100, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x80000001, 0x38768864}, 0x5840, 0xe79, 0x8, 0x3, 0xffff, 0xe3, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x3)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, &(0x7f0000000140))
r4 = openat$cgroup_ro(r3, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc020660b, &(0x7f0000000140))
r6 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x3, 0x3, &(0x7f0000000540)=[{&(0x7f00000003c0)="ea7d3567306217e8c617520135511409274af8c422d23b4398883ff6adfab14c16e6a9bdc11a8c3d8dd914b198509dcc63615c6324ef54ea518f712a9a4c6faccc89a9e8cef64a2d4e5e4b793d35daac3e974c69739af0261054efbf4e73c1a3cdb8300f0efc9ab08b3b341d67785e34df3da147814035213708e8", 0x7b, 0x79}, {&(0x7f0000000440)="17dc8042976129f4749d5b5b15d6b843f48ae4a981d148a1a765ad74f8b700c2891cab49b94712b7edbb2b5c15bb226dac96e6cd03e55a0f4fd86cf3b1e891e7ffa7d68221d696d2c54ee019a851a5715866f16c4c5973eb5f774232fe16bc81c58c53e177888ac5fe0f7bdbe102cae870e6bb8e972540d94b", 0x79, 0xffffffffffff9fd8}, {&(0x7f00000004c0)="52f1109eacf9c57a3dff03340cfe8da7c2945e75fd9d4f17bbb55731d23a5f4d0ebecfdc2781c874193343412762c6de5b151c8870edf0813d599f70972c30893b554649b452296290f15538f85b0f48e55111e1698ea6", 0x57, 0x109}], 0x80000, &(0x7f00000005c0)={[{@check_relaxed}, {@block={'block', 0x3d, 0xe00}}, {@uid={'uid', 0x3d, 0xee01}}], [{@obj_type={'obj_type', 0x3d, '-]\\!#&&#'}}, {@pcr={'pcr', 0x3d, 0x2a}}]})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f0000000640)={{0x1, 0x1, 0x18, r6, {0xfffff801}}, './file0\x00'})
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
r7 = dup2(r0, r2)
setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r4, 0x28, 0x6, &(0x7f00000002c0)={0x77359400}, 0x10)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000000c0)=<r8=>0x0)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3f, 0x5, 0x6, 0x40, 0x0, 0x10001, 0x18400, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xd}, 0x10800, 0x0, 0x3, 0x3, 0x0, 0x4, 0x3f, 0x0, 0x5, 0x0, 0x3}, r8, 0x7, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x3}, 0x2)

[  284.395967] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  284.403232] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  284.410486] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  284.417739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  284.424991] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
12:08:50 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x5, 0x2, 0x1, 0x40, 0x0, 0x4, 0x18044, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x92a0, 0x0, 0x3f, 0x1, 0x2, 0x4, 0xe318, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x9, r0, 0x1)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r1, &(0x7f0000000180)="4764328d256655fe42b902a5d061", 0xe, 0x76, 0x0)

[  284.470745] vxfs: WRONG superblock magic 00000000 at 1
12:08:50 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x5, 0x2, 0x1, 0x40, 0x0, 0x4, 0x18044, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x92a0, 0x0, 0x3f, 0x1, 0x2, 0x4, 0xe318, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x9, r0, 0x1) (async)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r1, &(0x7f0000000180)="4764328d256655fe42b902a5d061", 0xe, 0x76, 0x0)

12:08:50 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2)
preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000000)=""/17, 0x11}, {&(0x7f0000000040)}, {&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/171, 0xab}], 0x5, 0x1f5, 0x7fffffff)

[  284.510557] vxfs: WRONG superblock magic 00000000 at 8
[  284.524096] FAULT_INJECTION: forcing a failure.
[  284.524096] name failslab, interval 1, probability 0, space 0, times 0
[  284.535955] vxfs: can't find superblock.
[  284.566191] CPU: 0 PID: 17429 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  284.574117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  284.583455] Call Trace:
[  284.586029]  dump_stack+0x1b2/0x281
[  284.589643]  should_fail.cold+0x10a/0x149
[  284.593798]  should_failslab+0xd6/0x130
[  284.597755]  kmem_cache_alloc+0x28e/0x3c0
[  284.601891]  __kernfs_new_node+0x6f/0x470
[  284.606022]  kernfs_new_node+0x7b/0xe0
[  284.609893]  __kernfs_create_file+0x3d/0x320
[  284.614283]  sysfs_add_file_mode_ns+0x1e1/0x450
[  284.618944]  ? kernfs_create_dir_ns+0x171/0x200
[  284.623604]  internal_create_group+0x22b/0x710
[  284.628181]  lo_ioctl+0x1137/0x1cd0
[  284.631792]  ? loop_set_status64+0xe0/0xe0
[  284.636007]  blkdev_ioctl+0x540/0x1830
[  284.639881]  ? blkpg_ioctl+0x8d0/0x8d0
[  284.643749]  ? trace_hardirqs_on+0x10/0x10
[  284.647969]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  284.653052]  ? debug_check_no_obj_freed+0x2c0/0x680
[  284.658226]  block_ioctl+0xd9/0x120
[  284.661833]  ? blkdev_fallocate+0x3a0/0x3a0
[  284.666133]  do_vfs_ioctl+0x75a/0xff0
[  284.669912]  ? lock_acquire+0x170/0x3f0
[  284.673868]  ? ioctl_preallocate+0x1a0/0x1a0
[  284.678261]  ? __fget+0x265/0x3e0
[  284.681698]  ? do_vfs_ioctl+0xff0/0xff0
[  284.685653]  ? security_file_ioctl+0x83/0xb0
[  284.690056]  SyS_ioctl+0x7f/0xb0
[  284.693406]  ? do_vfs_ioctl+0xff0/0xff0
[  284.697389]  do_syscall_64+0x1d5/0x640
[  284.701266]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  284.706450] RIP: 0033:0x7f5c30cedfc7
[  284.710143] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  284.717845] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  284.725104] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  284.732376] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  284.739633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  284.746885] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:08:51 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 18)

12:08:51 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)
ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x80000000, 0x4, {<r2=>0xffffffffffffffff}, {0xee01}, 0x7, 0x1})
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x8, 0x3f, 0x3, 0x7f, 0x0, 0x7d0c, 0x2d401, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x7, 0x1ff}, 0x10000, 0x9, 0x1f, 0x5, 0x40, 0x1, 0x1, 0x0, 0x1ff, 0x0, 0xffffffffffffffff}, r2, 0x1, r0, 0x5)

12:08:51 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x5, 0x2, 0x1, 0x40, 0x0, 0x4, 0x18044, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x92a0, 0x0, 0x3f, 0x1, 0x2, 0x4, 0xe318, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x9, r0, 0x1) (async)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r1, &(0x7f0000000180)="4764328d256655fe42b902a5d061", 0xe, 0x76, 0x0)

[  284.788014] vxfs: WRONG superblock magic 00000000 at 1
[  284.794273] vxfs: WRONG superblock magic 00000000 at 8
[  284.808755] vxfs: can't find superblock.
12:08:51 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300), 0x101202, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1f, 0x8, 0x0, 0x5, 0x0, 0xfffffffffffffeff, 0x24c41, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000240), 0xe}, 0x3522, 0x8001, 0x7, 0x0, 0x822, 0x7fff, 0x3, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xb, r0, 0x8)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x80, 0x9, 0x82, 0x0, 0x0, 0x1f, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x71ce, 0x2, @perf_config_ext={0x0, 0xfff}, 0x400, 0x3, 0xc1f1, 0x3, 0x8, 0xfffffffe, 0x1ff, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0x3, r1, 0x2)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180))
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, <r2=>r1, {0x4}}, './file0\x00'})
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x0, 0x7fffffff, 0x9ee, 0x400, r1, 0x5, '\x00', 0x0, r2, 0x4, 0x5}, 0x48)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7)
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0xd4, 0x20, 0x40, 0x1, 0x0, 0x80000000, 0x8, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x0, 0x5}, 0x10010, 0xfffffffffffffbff, 0x4, 0x0, 0xeb428d3, 0x2, 0x80, 0x0, 0xfffffffc, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x8)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:08:51 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 14)

12:08:51 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
io_setup(0x1ff, &(0x7f0000000000)=<r2=>0x0)
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2)
r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r4, &(0x7f0000000040), 0x2)
fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000240), &(0x7f0000000280)={'L+', 0x10001}, 0x16, 0x2)
io_submit(r2, 0x2, &(0x7f0000000200)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x7, r3, &(0x7f00000000c0)="cf325ec264951dc4801ea4d5633fd9f2530318f2b52ec5d66891364f7230f4f6", 0x20, 0x8000000000000000, 0x0, 0x3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x1000, r0, &(0x7f0000000180)="c4a0ec773c435844949a1a9fe5b3660435fd866c54f7e6db8483582339dc28b76892fece516fb3926de0beac86d8", 0x2e, 0x0, 0x0, 0x2}])

[  284.906585] FAULT_INJECTION: forcing a failure.
[  284.906585] name failslab, interval 1, probability 0, space 0, times 0
[  284.932080] CPU: 1 PID: 17466 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  284.939987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  284.949339] Call Trace:
[  284.951927]  dump_stack+0x1b2/0x281
[  284.955576]  should_fail.cold+0x10a/0x149
[  284.959733]  should_failslab+0xd6/0x130
[  284.963714]  kmem_cache_alloc_trace+0x29a/0x3d0
[  284.968391]  ? dev_uevent_filter+0xd0/0xd0
[  284.972628]  kobject_uevent_env+0x20c/0xf30
[  284.976955]  ? internal_create_group+0x48f/0x710
[  284.981716]  lo_ioctl+0x11a6/0x1cd0
[  284.985356]  ? loop_set_status64+0xe0/0xe0
[  284.989600]  blkdev_ioctl+0x540/0x1830
[  284.993500]  ? blkpg_ioctl+0x8d0/0x8d0
[  284.997390]  ? perf_trace_lock+0xf7/0x490
[  285.001544]  ? perf_trace_lock_acquire+0x510/0x510
[  285.005914] FAULT_INJECTION: forcing a failure.
[  285.005914] name failslab, interval 1, probability 0, space 0, times 0
[  285.006472]  block_ioctl+0xd9/0x120
[  285.006493]  ? blkdev_fallocate+0x3a0/0x3a0
[  285.025570]  do_vfs_ioctl+0x75a/0xff0
[  285.029371]  ? lock_acquire+0x170/0x3f0
[  285.033336]  ? ioctl_preallocate+0x1a0/0x1a0
[  285.037737]  ? __fget+0x265/0x3e0
[  285.041192]  ? do_vfs_ioctl+0xff0/0xff0
[  285.045153]  ? security_file_ioctl+0x83/0xb0
[  285.049551]  SyS_ioctl+0x7f/0xb0
[  285.052903]  ? do_vfs_ioctl+0xff0/0xff0
[  285.056954]  do_syscall_64+0x1d5/0x640
[  285.060857]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  285.066046] RIP: 0033:0x7faf49caafc7
[  285.069737] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  285.077433] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  285.084688] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  285.091936] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  285.099187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  285.106441] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  285.113709] CPU: 0 PID: 17475 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  285.121590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  285.125806] vxfs: WRONG superblock magic 00000000 at 1
[  285.130934] Call Trace:
[  285.130952]  dump_stack+0x1b2/0x281
[  285.130968]  should_fail.cold+0x10a/0x149
[  285.130984]  should_failslab+0xd6/0x130
[  285.130996]  kmem_cache_alloc+0x28e/0x3c0
12:08:51 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32)
r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300), 0x101202, 0x0) (rerun: 32)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1f, 0x8, 0x0, 0x5, 0x0, 0xfffffffffffffeff, 0x24c41, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000240), 0xe}, 0x3522, 0x8001, 0x7, 0x0, 0x822, 0x7fff, 0x3, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xb, r0, 0x8)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x80, 0x9, 0x82, 0x0, 0x0, 0x1f, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x71ce, 0x2, @perf_config_ext={0x0, 0xfff}, 0x400, 0x3, 0xc1f1, 0x3, 0x8, 0xfffffffe, 0x1ff, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0x3, r1, 0x2)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180))
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, <r2=>r1, {0x4}}, './file0\x00'})
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x0, 0x7fffffff, 0x9ee, 0x400, r1, 0x5, '\x00', 0x0, r2, 0x4, 0x5}, 0x48) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7) (async)
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0xd4, 0x20, 0x40, 0x1, 0x0, 0x80000000, 0x8, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x0, 0x5}, 0x10010, 0xfffffffffffffbff, 0x4, 0x0, 0xeb428d3, 0x2, 0x80, 0x0, 0xfffffffc, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x8) (async, rerun: 64)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (rerun: 64)

[  285.131011]  __kernfs_new_node+0x6f/0x470
[  285.136685] vxfs: WRONG superblock magic 00000000 at 8
[  285.138897]  kernfs_new_node+0x7b/0xe0
[  285.138911]  __kernfs_create_file+0x3d/0x320
[  285.138924]  sysfs_add_file_mode_ns+0x1e1/0x450
[  285.138934]  ? kernfs_create_dir_ns+0x171/0x200
[  285.138945]  internal_create_group+0x22b/0x710
[  285.142653] vxfs: can't find superblock.
[  285.146709]  lo_ioctl+0x1137/0x1cd0
[  285.146723]  ? loop_set_status64+0xe0/0xe0
[  285.146737]  blkdev_ioctl+0x540/0x1830
[  285.146748]  ? blkpg_ioctl+0x8d0/0x8d0
12:08:51 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300), 0x101202, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1f, 0x8, 0x0, 0x5, 0x0, 0xfffffffffffffeff, 0x24c41, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000240), 0xe}, 0x3522, 0x8001, 0x7, 0x0, 0x822, 0x7fff, 0x3, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xb, r0, 0x8) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x80, 0x9, 0x82, 0x0, 0x0, 0x1f, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x71ce, 0x2, @perf_config_ext={0x0, 0xfff}, 0x400, 0x3, 0xc1f1, 0x3, 0x8, 0xfffffffe, 0x1ff, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0x3, r1, 0x2) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) (async)
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, <r2=>r1, {0x4}}, './file0\x00'})
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x0, 0x7fffffff, 0x9ee, 0x400, r1, 0x5, '\x00', 0x0, r2, 0x4, 0x5}, 0x48)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7) (async)
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0xd4, 0x20, 0x40, 0x1, 0x0, 0x80000000, 0x8, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x0, 0x5}, 0x10010, 0xfffffffffffffbff, 0x4, 0x0, 0xeb428d3, 0x2, 0x80, 0x0, 0xfffffffc, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x8) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  285.146761]  ? perf_trace_lock+0xf7/0x490
[  285.146774]  ? perf_trace_lock_acquire+0x510/0x510
[  285.146789]  block_ioctl+0xd9/0x120
[  285.218715]  ? blkdev_fallocate+0x3a0/0x3a0
[  285.223040]  do_vfs_ioctl+0x75a/0xff0
[  285.226877]  ? lock_acquire+0x170/0x3f0
[  285.230856]  ? ioctl_preallocate+0x1a0/0x1a0
[  285.235270]  ? __fget+0x265/0x3e0
[  285.238723]  ? do_vfs_ioctl+0xff0/0xff0
[  285.242701]  ? security_file_ioctl+0x83/0xb0
[  285.247110]  SyS_ioctl+0x7f/0xb0
[  285.250475]  ? do_vfs_ioctl+0xff0/0xff0
[  285.254450]  do_syscall_64+0x1d5/0x640
[  285.258350]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  285.263538] RIP: 0033:0x7f5c30cedfc7
[  285.267244] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  285.274951] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  285.282214] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  285.289475] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  285.296824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  285.304090] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  285.337645] vxfs: WRONG superblock magic 00000000 at 1
[  285.348712] vxfs: WRONG superblock magic 00000000 at 8
[  285.360012] vxfs: can't find superblock.
12:08:52 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x4, 0x6, 0x7, 0x1, 0x0, 0x4, 0x8100, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x80000001, 0x38768864}, 0x5840, 0xe79, 0x8, 0x3, 0xffff, 0xe3, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x3)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, &(0x7f0000000140))
r4 = openat$cgroup_ro(r3, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc020660b, &(0x7f0000000140))
r6 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x3, 0x3, &(0x7f0000000540)=[{&(0x7f00000003c0)="ea7d3567306217e8c617520135511409274af8c422d23b4398883ff6adfab14c16e6a9bdc11a8c3d8dd914b198509dcc63615c6324ef54ea518f712a9a4c6faccc89a9e8cef64a2d4e5e4b793d35daac3e974c69739af0261054efbf4e73c1a3cdb8300f0efc9ab08b3b341d67785e34df3da147814035213708e8", 0x7b, 0x79}, {&(0x7f0000000440)="17dc8042976129f4749d5b5b15d6b843f48ae4a981d148a1a765ad74f8b700c2891cab49b94712b7edbb2b5c15bb226dac96e6cd03e55a0f4fd86cf3b1e891e7ffa7d68221d696d2c54ee019a851a5715866f16c4c5973eb5f774232fe16bc81c58c53e177888ac5fe0f7bdbe102cae870e6bb8e972540d94b", 0x79, 0xffffffffffff9fd8}, {&(0x7f00000004c0)="52f1109eacf9c57a3dff03340cfe8da7c2945e75fd9d4f17bbb55731d23a5f4d0ebecfdc2781c874193343412762c6de5b151c8870edf0813d599f70972c30893b554649b452296290f15538f85b0f48e55111e1698ea6", 0x57, 0x109}], 0x80000, &(0x7f00000005c0)={[{@check_relaxed}, {@block={'block', 0x3d, 0xe00}}, {@uid={'uid', 0x3d, 0xee01}}], [{@obj_type={'obj_type', 0x3d, '-]\\!#&&#'}}, {@pcr={'pcr', 0x3d, 0x2a}}]})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f0000000640)={{0x1, 0x1, 0x18, r6, {0xfffff801}}, './file0\x00'})
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
r7 = dup2(r0, r2)
setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r4, 0x28, 0x6, &(0x7f00000002c0)={0x77359400}, 0x10)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000000c0)=<r8=>0x0)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3f, 0x5, 0x6, 0x40, 0x0, 0x10001, 0x18400, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xd}, 0x10800, 0x0, 0x3, 0x3, 0x0, 0x4, 0x3f, 0x0, 0x5, 0x0, 0x3}, r8, 0x7, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x3}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x4, 0x6, 0x7, 0x1, 0x0, 0x4, 0x8100, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x80000001, 0x38768864}, 0x5840, 0xe79, 0x8, 0x3, 0xffff, 0xe3, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x3) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, &(0x7f0000000140)) (async)
openat$cgroup_ro(r3, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc020660b, &(0x7f0000000140)) (async)
syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x3, 0x3, &(0x7f0000000540)=[{&(0x7f00000003c0)="ea7d3567306217e8c617520135511409274af8c422d23b4398883ff6adfab14c16e6a9bdc11a8c3d8dd914b198509dcc63615c6324ef54ea518f712a9a4c6faccc89a9e8cef64a2d4e5e4b793d35daac3e974c69739af0261054efbf4e73c1a3cdb8300f0efc9ab08b3b341d67785e34df3da147814035213708e8", 0x7b, 0x79}, {&(0x7f0000000440)="17dc8042976129f4749d5b5b15d6b843f48ae4a981d148a1a765ad74f8b700c2891cab49b94712b7edbb2b5c15bb226dac96e6cd03e55a0f4fd86cf3b1e891e7ffa7d68221d696d2c54ee019a851a5715866f16c4c5973eb5f774232fe16bc81c58c53e177888ac5fe0f7bdbe102cae870e6bb8e972540d94b", 0x79, 0xffffffffffff9fd8}, {&(0x7f00000004c0)="52f1109eacf9c57a3dff03340cfe8da7c2945e75fd9d4f17bbb55731d23a5f4d0ebecfdc2781c874193343412762c6de5b151c8870edf0813d599f70972c30893b554649b452296290f15538f85b0f48e55111e1698ea6", 0x57, 0x109}], 0x80000, &(0x7f00000005c0)={[{@check_relaxed}, {@block={'block', 0x3d, 0xe00}}, {@uid={'uid', 0x3d, 0xee01}}], [{@obj_type={'obj_type', 0x3d, '-]\\!#&&#'}}, {@pcr={'pcr', 0x3d, 0x2a}}]}) (async)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f0000000640)={{0x1, 0x1, 0x18, r6, {0xfffff801}}, './file0\x00'}) (async)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2) (async)
dup2(r0, r2) (async)
setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r4, 0x28, 0x6, &(0x7f00000002c0)={0x77359400}, 0x10) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000000c0)) (async)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3f, 0x5, 0x6, 0x40, 0x0, 0x10001, 0x18400, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xd}, 0x10800, 0x0, 0x3, 0x3, 0x0, 0x4, 0x3f, 0x0, 0x5, 0x0, 0x3}, r8, 0x7, 0xffffffffffffffff, 0x0) (async)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x3}, 0x2) (async)

12:08:52 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='}!\x00')
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:08:52 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 19)

12:08:52 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async, rerun: 64)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fd/3\x00') (rerun: 64)
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) (async)
preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000000)=""/17, 0x11}, {&(0x7f0000000040)}, {&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/171, 0xab}], 0x5, 0x1f5, 0x7fffffff)

12:08:52 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 15)

12:08:53 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)
io_setup(0x1ff, &(0x7f0000000000)=<r2=>0x0)
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2) (async)
r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r4, &(0x7f0000000040), 0x2) (async)
fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000240), &(0x7f0000000280)={'L+', 0x10001}, 0x16, 0x2) (async)
io_submit(r2, 0x2, &(0x7f0000000200)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x7, r3, &(0x7f00000000c0)="cf325ec264951dc4801ea4d5633fd9f2530318f2b52ec5d66891364f7230f4f6", 0x20, 0x8000000000000000, 0x0, 0x3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x1000, r0, &(0x7f0000000180)="c4a0ec773c435844949a1a9fe5b3660435fd866c54f7e6db8483582339dc28b76892fece516fb3926de0beac86d8", 0x2e, 0x0, 0x0, 0x2}])

12:08:53 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='}!\x00')
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='}!\x00') (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  286.625810] FAULT_INJECTION: forcing a failure.
[  286.625810] name failslab, interval 1, probability 0, space 0, times 0
[  286.632797] FAULT_INJECTION: forcing a failure.
[  286.632797] name failslab, interval 1, probability 0, space 0, times 0
[  286.676015] misc userio: No port type given on /dev/userio
[  286.681073] CPU: 0 PID: 17528 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  286.689546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  286.698984] Call Trace:
[  286.701576]  dump_stack+0x1b2/0x281
[  286.705213]  should_fail.cold+0x10a/0x149
[  286.709360]  should_failslab+0xd6/0x130
[  286.713334]  kmem_cache_alloc_trace+0x29a/0x3d0
[  286.718001]  ? dev_uevent_filter+0xd0/0xd0
[  286.722242]  kobject_uevent_env+0x20c/0xf30
[  286.726568]  ? internal_create_group+0x48f/0x710
[  286.731321]  lo_ioctl+0x11a6/0x1cd0
[  286.734957]  ? loop_set_status64+0xe0/0xe0
[  286.739191]  blkdev_ioctl+0x540/0x1830
[  286.743076]  ? blkpg_ioctl+0x8d0/0x8d0
[  286.746960]  ? perf_trace_lock+0xf7/0x490
[  286.751110]  ? perf_trace_lock_acquire+0x510/0x510
[  286.756043]  block_ioctl+0xd9/0x120
[  286.759676]  ? blkdev_fallocate+0x3a0/0x3a0
[  286.764004]  do_vfs_ioctl+0x75a/0xff0
[  286.767908]  ? lock_acquire+0x170/0x3f0
[  286.771883]  ? ioctl_preallocate+0x1a0/0x1a0
[  286.776420]  ? __fget+0x265/0x3e0
[  286.779876]  ? do_vfs_ioctl+0xff0/0xff0
[  286.783855]  ? security_file_ioctl+0x83/0xb0
[  286.788260]  SyS_ioctl+0x7f/0xb0
[  286.791621]  ? do_vfs_ioctl+0xff0/0xff0
[  286.795592]  do_syscall_64+0x1d5/0x640
[  286.799504]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  286.804688] RIP: 0033:0x7faf49caafc7
[  286.808402] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  286.816195] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  286.823459] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  286.830720] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  286.837975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  286.845233] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  286.852507] CPU: 1 PID: 17522 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  286.860386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  286.861884] vxfs: WRONG superblock magic 00000000 at 1
[  286.869731] Call Trace:
[  286.869747]  dump_stack+0x1b2/0x281
[  286.869763]  should_fail.cold+0x10a/0x149
[  286.869778]  should_failslab+0xd6/0x130
[  286.869790]  kmem_cache_alloc+0x28e/0x3c0
[  286.869804]  __kernfs_new_node+0x6f/0x470
[  286.869817]  kernfs_new_node+0x7b/0xe0
[  286.869827]  __kernfs_create_file+0x3d/0x320
[  286.869840]  sysfs_add_file_mode_ns+0x1e1/0x450
[  286.869850]  ? kernfs_create_dir_ns+0x171/0x200
[  286.869862]  internal_create_group+0x22b/0x710
[  286.869879]  lo_ioctl+0x1137/0x1cd0
[  286.869893]  ? loop_set_status64+0xe0/0xe0
[  286.869905]  blkdev_ioctl+0x540/0x1830
[  286.869916]  ? blkpg_ioctl+0x8d0/0x8d0
[  286.869931]  ? perf_trace_lock+0xf7/0x490
[  286.875552] vxfs: WRONG superblock magic 00000000 at 8
[  286.877762]  ? perf_trace_lock_acquire+0x510/0x510
[  286.877779]  block_ioctl+0xd9/0x120
[  286.877787]  ? blkdev_fallocate+0x3a0/0x3a0
[  286.877798]  do_vfs_ioctl+0x75a/0xff0
[  286.881473] vxfs: can't find superblock.
[  286.885530]  ? lock_acquire+0x170/0x3f0
[  286.885543]  ? ioctl_preallocate+0x1a0/0x1a0
[  286.885557]  ? __fget+0x265/0x3e0
[  286.885567]  ? do_vfs_ioctl+0xff0/0xff0
[  286.885580]  ? security_file_ioctl+0x83/0xb0
[  286.885591]  SyS_ioctl+0x7f/0xb0
[  286.885600]  ? do_vfs_ioctl+0xff0/0xff0
[  286.992982]  do_syscall_64+0x1d5/0x640
[  286.996859]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  287.002035] RIP: 0033:0x7f5c30cedfc7
[  287.005721] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  287.013514] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
12:08:53 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='}!\x00') (async, rerun: 64)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (rerun: 64)

12:08:53 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 20)

[  287.020763] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  287.028016] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  287.035280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  287.042530] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:08:53 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:08:53 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  287.120228] FAULT_INJECTION: forcing a failure.
[  287.120228] name failslab, interval 1, probability 0, space 0, times 0
[  287.144137] vxfs: WRONG superblock magic 00000000 at 1
[  287.149778] CPU: 1 PID: 17582 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  287.157693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  287.167043] Call Trace:
12:08:53 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  287.169639]  dump_stack+0x1b2/0x281
[  287.173278]  should_fail.cold+0x10a/0x149
[  287.174467] vxfs: WRONG superblock magic 00000000 at 8
[  287.177423]  should_failslab+0xd6/0x130
[  287.186677] vxfs: can't find superblock.
[  287.186722]  kmem_cache_alloc_node+0x263/0x410
[  287.195349]  __alloc_skb+0x5c/0x510
[  287.198978]  kobject_uevent_env+0x882/0xf30
[  287.203346]  lo_ioctl+0x11a6/0x1cd0
[  287.206980]  ? loop_set_status64+0xe0/0xe0
[  287.211216]  blkdev_ioctl+0x540/0x1830
[  287.215112]  ? blkpg_ioctl+0x8d0/0x8d0
[  287.218991]  ? perf_trace_lock+0xf7/0x490
[  287.223128]  ? perf_trace_lock_acquire+0x510/0x510
[  287.228177]  block_ioctl+0xd9/0x120
[  287.231784]  ? blkdev_fallocate+0x3a0/0x3a0
[  287.236098]  do_vfs_ioctl+0x75a/0xff0
[  287.239895]  ? lock_acquire+0x170/0x3f0
[  287.243856]  ? ioctl_preallocate+0x1a0/0x1a0
[  287.248259]  ? __fget+0x265/0x3e0
[  287.251700]  ? do_vfs_ioctl+0xff0/0xff0
[  287.255663]  ? security_file_ioctl+0x83/0xb0
[  287.260086]  SyS_ioctl+0x7f/0xb0
[  287.263453]  ? do_vfs_ioctl+0xff0/0xff0
[  287.267416]  do_syscall_64+0x1d5/0x640
[  287.271295]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  287.276470] RIP: 0033:0x7faf49caafc7
[  287.280157] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  287.287844] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  287.295093] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  287.302352] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  287.309612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  287.316865] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  287.358431] vxfs: WRONG superblock magic 00000000 at 1
[  287.364454] vxfs: WRONG superblock magic 00000000 at 8
[  287.369735] vxfs: can't find superblock.
12:08:54 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 16)

12:08:54 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x0, 0x1, 0x2, 0x5, 0x0, 0x0, 0x8000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x20, 0xffffffffffffff81, 0x4, 0x8, 0xff, 0xffffffff, 0x64b1, 0x0, 0x0, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r0, 0x1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:08:54 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 21)

12:08:54 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x4, 0x6, 0x7, 0x1, 0x0, 0x4, 0x8100, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x80000001, 0x38768864}, 0x5840, 0xe79, 0x8, 0x3, 0xffff, 0xe3, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x3) (async)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, &(0x7f0000000140)) (async)
r4 = openat$cgroup_ro(r3, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) (async)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc020660b, &(0x7f0000000140))
r6 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x3, 0x3, &(0x7f0000000540)=[{&(0x7f00000003c0)="ea7d3567306217e8c617520135511409274af8c422d23b4398883ff6adfab14c16e6a9bdc11a8c3d8dd914b198509dcc63615c6324ef54ea518f712a9a4c6faccc89a9e8cef64a2d4e5e4b793d35daac3e974c69739af0261054efbf4e73c1a3cdb8300f0efc9ab08b3b341d67785e34df3da147814035213708e8", 0x7b, 0x79}, {&(0x7f0000000440)="17dc8042976129f4749d5b5b15d6b843f48ae4a981d148a1a765ad74f8b700c2891cab49b94712b7edbb2b5c15bb226dac96e6cd03e55a0f4fd86cf3b1e891e7ffa7d68221d696d2c54ee019a851a5715866f16c4c5973eb5f774232fe16bc81c58c53e177888ac5fe0f7bdbe102cae870e6bb8e972540d94b", 0x79, 0xffffffffffff9fd8}, {&(0x7f00000004c0)="52f1109eacf9c57a3dff03340cfe8da7c2945e75fd9d4f17bbb55731d23a5f4d0ebecfdc2781c874193343412762c6de5b151c8870edf0813d599f70972c30893b554649b452296290f15538f85b0f48e55111e1698ea6", 0x57, 0x109}], 0x80000, &(0x7f00000005c0)={[{@check_relaxed}, {@block={'block', 0x3d, 0xe00}}, {@uid={'uid', 0x3d, 0xee01}}], [{@obj_type={'obj_type', 0x3d, '-]\\!#&&#'}}, {@pcr={'pcr', 0x3d, 0x2a}}]})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f0000000640)={{0x1, 0x1, 0x18, r6, {0xfffff801}}, './file0\x00'}) (async)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async, rerun: 64)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2) (async, rerun: 64)
r7 = dup2(r0, r2)
setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r4, 0x28, 0x6, &(0x7f00000002c0)={0x77359400}, 0x10) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000000c0)=<r8=>0x0)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3f, 0x5, 0x6, 0x40, 0x0, 0x10001, 0x18400, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xd}, 0x10800, 0x0, 0x3, 0x3, 0x0, 0x4, 0x3f, 0x0, 0x5, 0x0, 0x3}, r8, 0x7, 0xffffffffffffffff, 0x0) (async)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x3}, 0x2)

12:08:54 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2)
preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000000)=""/17, 0x11}, {&(0x7f0000000040)}, {&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/171, 0xab}], 0x5, 0x1f5, 0x7fffffff)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fd/3\x00') (async)
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) (async)
preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000000)=""/17, 0x11}, {&(0x7f0000000040)}, {&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/171, 0xab}], 0x5, 0x1f5, 0x7fffffff) (async)

[  288.219897] FAULT_INJECTION: forcing a failure.
[  288.219897] name failslab, interval 1, probability 0, space 0, times 0
[  288.237711] CPU: 0 PID: 17620 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  288.245607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  288.247649] FAULT_INJECTION: forcing a failure.
[  288.247649] name failslab, interval 1, probability 0, space 0, times 0
[  288.254971] Call Trace:
[  288.254990]  dump_stack+0x1b2/0x281
[  288.255006]  should_fail.cold+0x10a/0x149
[  288.255019]  should_failslab+0xd6/0x130
[  288.255031]  kmem_cache_alloc+0x28e/0x3c0
[  288.255045]  __kernfs_new_node+0x6f/0x470
[  288.255059]  kernfs_new_node+0x7b/0xe0
[  288.255069]  __kernfs_create_file+0x3d/0x320
[  288.255084]  sysfs_add_file_mode_ns+0x1e1/0x450
[  288.301732]  ? kernfs_create_dir_ns+0x171/0x200
[  288.306392]  internal_create_group+0x22b/0x710
[  288.310974]  lo_ioctl+0x1137/0x1cd0
[  288.314592]  ? loop_set_status64+0xe0/0xe0
[  288.318824]  blkdev_ioctl+0x540/0x1830
[  288.322702]  ? blkpg_ioctl+0x8d0/0x8d0
[  288.326582]  ? perf_trace_lock+0xf7/0x490
[  288.330715]  ? perf_trace_lock_acquire+0x510/0x510
[  288.335629]  block_ioctl+0xd9/0x120
[  288.339238]  ? blkdev_fallocate+0x3a0/0x3a0
[  288.343542]  do_vfs_ioctl+0x75a/0xff0
[  288.347348]  ? lock_acquire+0x170/0x3f0
[  288.351326]  ? ioctl_preallocate+0x1a0/0x1a0
[  288.355724]  ? __fget+0x265/0x3e0
[  288.359165]  ? do_vfs_ioctl+0xff0/0xff0
[  288.363129]  ? security_file_ioctl+0x83/0xb0
[  288.367524]  SyS_ioctl+0x7f/0xb0
[  288.370871]  ? do_vfs_ioctl+0xff0/0xff0
[  288.374829]  do_syscall_64+0x1d5/0x640
[  288.378709]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  288.383886] RIP: 0033:0x7f5c30cedfc7
[  288.387575] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  288.395263] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  288.402514] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  288.409765] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  288.417026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  288.424273] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  288.431537] CPU: 1 PID: 17627 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  288.439422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  288.448765] Call Trace:
[  288.451350]  dump_stack+0x1b2/0x281
[  288.454982]  should_fail.cold+0x10a/0x149
[  288.459134]  should_failslab+0xd6/0x130
[  288.463112]  kmem_cache_alloc_node+0x263/0x410
[  288.467701]  __alloc_skb+0x5c/0x510
[  288.471322]  kobject_uevent_env+0x882/0xf30
[  288.475638]  lo_ioctl+0x11a6/0x1cd0
[  288.479245]  ? loop_set_status64+0xe0/0xe0
[  288.483463]  blkdev_ioctl+0x540/0x1830
[  288.487328]  ? blkpg_ioctl+0x8d0/0x8d0
[  288.491200]  ? perf_trace_lock+0xf7/0x490
[  288.495378]  ? perf_trace_lock_acquire+0x510/0x510
[  288.500294]  block_ioctl+0xd9/0x120
[  288.503914]  ? blkdev_fallocate+0x3a0/0x3a0
[  288.508314]  do_vfs_ioctl+0x75a/0xff0
[  288.512159]  ? lock_acquire+0x170/0x3f0
[  288.516109]  ? ioctl_preallocate+0x1a0/0x1a0
[  288.520494]  ? __fget+0x265/0x3e0
[  288.523925]  ? do_vfs_ioctl+0xff0/0xff0
[  288.527878]  ? security_file_ioctl+0x83/0xb0
[  288.532262]  SyS_ioctl+0x7f/0xb0
[  288.535613]  ? do_vfs_ioctl+0xff0/0xff0
[  288.539573]  do_syscall_64+0x1d5/0x640
[  288.543449]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  288.548621] RIP: 0033:0x7faf49caafc7
[  288.552327] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  288.556952] misc userio: Begin command sent, but we're already running
12:08:54 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
io_setup(0x1ff, &(0x7f0000000000)=<r2=>0x0)
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2)
r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r4, &(0x7f0000000040), 0x2)
fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000240), &(0x7f0000000280)={'L+', 0x10001}, 0x16, 0x2)
io_submit(r2, 0x2, &(0x7f0000000200)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x7, r3, &(0x7f00000000c0)="cf325ec264951dc4801ea4d5633fd9f2530318f2b52ec5d66891364f7230f4f6", 0x20, 0x8000000000000000, 0x0, 0x3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x1000, r0, &(0x7f0000000180)="c4a0ec773c435844949a1a9fe5b3660435fd866c54f7e6db8483582339dc28b76892fece516fb3926de0beac86d8", 0x2e, 0x0, 0x0, 0x2}])
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)
io_setup(0x1ff, &(0x7f0000000000)) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r4, &(0x7f0000000040), 0x2) (async)
fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000240), &(0x7f0000000280)={'L+', 0x10001}, 0x16, 0x2) (async)
io_submit(r2, 0x2, &(0x7f0000000200)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x7, r3, &(0x7f00000000c0)="cf325ec264951dc4801ea4d5633fd9f2530318f2b52ec5d66891364f7230f4f6", 0x20, 0x8000000000000000, 0x0, 0x3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x1000, r0, &(0x7f0000000180)="c4a0ec773c435844949a1a9fe5b3660435fd866c54f7e6db8483582339dc28b76892fece516fb3926de0beac86d8", 0x2e, 0x0, 0x0, 0x2}]) (async)

12:08:54 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x0, 0x1, 0x2, 0x5, 0x0, 0x0, 0x8000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x20, 0xffffffffffffff81, 0x4, 0x8, 0xff, 0xffffffff, 0x64b1, 0x0, 0x0, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r0, 0x1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  288.560015] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  288.560022] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  288.560028] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  288.560034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  288.560040] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  288.588961] vxfs: WRONG superblock magic 00000000 at 1
[  288.609304] vxfs: WRONG superblock magic 00000000 at 1
[  288.638153] vxfs: WRONG superblock magic 00000000 at 8
12:08:55 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180))
perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x0, 0x1, 0x2, 0x5, 0x0, 0x0, 0x8000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x20, 0xffffffffffffff81, 0x4, 0x8, 0xff, 0xffffffff, 0x64b1, 0x0, 0x0, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r0, 0x1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) (async)
perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x0, 0x1, 0x2, 0x5, 0x0, 0x0, 0x8000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x20, 0xffffffffffffff81, 0x4, 0x8, 0xff, 0xffffffff, 0x64b1, 0x0, 0x0, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r0, 0x1) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

12:08:55 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 17)

[  288.659431] vxfs: WRONG superblock magic 00000000 at 8
[  288.660290] vxfs: can't find superblock.
[  288.681592] vxfs: can't find superblock.
12:08:55 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 22)

12:08:55 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x200000c, 0x12, r0, 0xe281f000)
mq_open(&(0x7f0000006180)='}$\x00', 0x40, 0x0, 0x0)

[  288.785174] FAULT_INJECTION: forcing a failure.
[  288.785174] name failslab, interval 1, probability 0, space 0, times 0
[  288.793401] FAULT_INJECTION: forcing a failure.
[  288.793401] name failslab, interval 1, probability 0, space 0, times 0
[  288.804279] CPU: 1 PID: 17686 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  288.815418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  288.824758] Call Trace:
[  288.827330]  dump_stack+0x1b2/0x281
[  288.830943]  should_fail.cold+0x10a/0x149
[  288.835074]  should_failslab+0xd6/0x130
[  288.839029]  kmem_cache_alloc_node_trace+0x25a/0x400
[  288.844117]  __kmalloc_node_track_caller+0x38/0x70
[  288.849030]  __alloc_skb+0x96/0x510
[  288.852640]  kobject_uevent_env+0x882/0xf30
[  288.856963]  lo_ioctl+0x11a6/0x1cd0
[  288.860597]  ? loop_set_status64+0xe0/0xe0
[  288.864817]  blkdev_ioctl+0x540/0x1830
[  288.868689]  ? blkpg_ioctl+0x8d0/0x8d0
[  288.872649]  ? perf_trace_lock+0xf7/0x490
[  288.876778]  ? perf_trace_lock_acquire+0x510/0x510
[  288.881695]  block_ioctl+0xd9/0x120
[  288.885302]  ? blkdev_fallocate+0x3a0/0x3a0
[  288.889613]  do_vfs_ioctl+0x75a/0xff0
[  288.893493]  ? lock_acquire+0x170/0x3f0
[  288.897454]  ? ioctl_preallocate+0x1a0/0x1a0
[  288.901846]  ? __fget+0x265/0x3e0
[  288.905282]  ? do_vfs_ioctl+0xff0/0xff0
[  288.909239]  ? security_file_ioctl+0x83/0xb0
[  288.913627]  SyS_ioctl+0x7f/0xb0
[  288.916973]  ? do_vfs_ioctl+0xff0/0xff0
[  288.920929]  do_syscall_64+0x1d5/0x640
[  288.924810]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  288.929984] RIP: 0033:0x7faf49caafc7
[  288.933673] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  288.941360] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  288.948611] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  288.955858] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  288.963105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  288.970352] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  288.977620] CPU: 0 PID: 17685 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  288.985504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  288.994854] Call Trace:
[  288.997442]  dump_stack+0x1b2/0x281
[  289.001076]  should_fail.cold+0x10a/0x149
[  289.005248]  should_failslab+0xd6/0x130
[  289.009228]  kmem_cache_alloc+0x28e/0x3c0
[  289.013406]  __kernfs_new_node+0x6f/0x470
[  289.017551] vxfs: WRONG superblock magic 00000000 at 1
[  289.017564]  kernfs_new_node+0x7b/0xe0
[  289.017577]  __kernfs_create_file+0x3d/0x320
[  289.028022] vxfs: WRONG superblock magic 00000000 at 8
[  289.031135]  sysfs_add_file_mode_ns+0x1e1/0x450
[  289.031147]  ? kernfs_create_dir_ns+0x171/0x200
[  289.031160]  internal_create_group+0x22b/0x710
[  289.031179]  lo_ioctl+0x1137/0x1cd0
[  289.031194]  ? loop_set_status64+0xe0/0xe0
[  289.031207]  blkdev_ioctl+0x540/0x1830
[  289.031219]  ? blkpg_ioctl+0x8d0/0x8d0
[  289.040980] vxfs: can't find superblock.
[  289.041135]  ? perf_trace_lock+0xf7/0x490
[  289.074043]  ? perf_trace_lock_acquire+0x510/0x510
[  289.078982]  block_ioctl+0xd9/0x120
[  289.082606]  ? blkdev_fallocate+0x3a0/0x3a0
[  289.086916]  do_vfs_ioctl+0x75a/0xff0
[  289.090714]  ? lock_acquire+0x170/0x3f0
[  289.094676]  ? ioctl_preallocate+0x1a0/0x1a0
[  289.099076]  ? __fget+0x265/0x3e0
[  289.102517]  ? do_vfs_ioctl+0xff0/0xff0
[  289.106479]  ? security_file_ioctl+0x83/0xb0
[  289.110874]  SyS_ioctl+0x7f/0xb0
[  289.114225]  ? do_vfs_ioctl+0xff0/0xff0
[  289.118184]  do_syscall_64+0x1d5/0x640
[  289.122057]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  289.127227] RIP: 0033:0x7f5c30cedfc7
12:08:55 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x200000c, 0x12, r0, 0xe281f000)
mq_open(&(0x7f0000006180)='}$\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x200000c, 0x12, r0, 0xe281f000) (async)
mq_open(&(0x7f0000006180)='}$\x00', 0x40, 0x0, 0x0) (async)

[  289.130917] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  289.138704] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  289.145965] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  289.153216] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  289.160482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  289.167735] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:08:55 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 23)

12:08:55 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x200000c, 0x12, r0, 0xe281f000) (async)
mq_open(&(0x7f0000006180)='}$\x00', 0x40, 0x0, 0x0)

[  289.212720] vxfs: WRONG superblock magic 00000000 at 1
[  289.219145] vxfs: WRONG superblock magic 00000000 at 8
[  289.239685] vxfs: can't find superblock.
[  289.299576] FAULT_INJECTION: forcing a failure.
[  289.299576] name failslab, interval 1, probability 0, space 0, times 0
[  289.316996] CPU: 0 PID: 17709 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  289.324898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  289.334261] Call Trace:
[  289.336830]  dump_stack+0x1b2/0x281
[  289.340444]  should_fail.cold+0x10a/0x149
[  289.344571]  should_failslab+0xd6/0x130
[  289.348528]  kmem_cache_alloc_node+0x263/0x410
[  289.353096]  __alloc_skb+0x5c/0x510
[  289.356702]  kobject_uevent_env+0x882/0xf30
[  289.361021]  lo_ioctl+0x11a6/0x1cd0
[  289.364630]  ? loop_set_status64+0xe0/0xe0
[  289.368842]  blkdev_ioctl+0x540/0x1830
[  289.372723]  ? blkpg_ioctl+0x8d0/0x8d0
[  289.376602]  ? trace_hardirqs_on+0x10/0x10
[  289.380903]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  289.385990]  ? debug_check_no_obj_freed+0x2c0/0x680
[  289.391004]  block_ioctl+0xd9/0x120
[  289.394612]  ? blkdev_fallocate+0x3a0/0x3a0
[  289.398912]  do_vfs_ioctl+0x75a/0xff0
[  289.402694]  ? lock_acquire+0x170/0x3f0
[  289.406656]  ? ioctl_preallocate+0x1a0/0x1a0
[  289.411042]  ? __fget+0x265/0x3e0
[  289.414471]  ? do_vfs_ioctl+0xff0/0xff0
[  289.418425]  ? security_file_ioctl+0x83/0xb0
[  289.422810]  SyS_ioctl+0x7f/0xb0
[  289.426153]  ? do_vfs_ioctl+0xff0/0xff0
[  289.430106]  do_syscall_64+0x1d5/0x640
[  289.433974]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  289.439151] RIP: 0033:0x7faf49caafc7
[  289.442838] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  289.450532] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  289.457780] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  289.465025] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  289.472275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  289.479522] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  289.503637] vxfs: WRONG superblock magic 00000000 at 1
[  289.509354] vxfs: WRONG superblock magic 00000000 at 8
[  289.515078] vxfs: can't find superblock.
12:08:56 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x40001, 0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0x3f, 0x80, 0xde, 0x0, 0x3, 0x2000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xffff, 0x1000}, 0x10000, 0x4, 0x3, 0x0, 0x1, 0x4, 0x800, 0x0, 0x7, 0x0, 0x2bf1c95d}, 0xffffffffffffffff, 0x2, r1, 0x9)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:08:56 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 18)

12:08:56 executing program 5:
mq_open(&(0x7f0000006180)='}!\x00', 0x80, 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x3000, 0x80)
mq_timedreceive(r0, &(0x7f00000000c0)=""/15, 0xf, 0x20, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000100))
clock_gettime(0x0, &(0x7f0000000040)={<r1=>0x0, <r2=>0x0})
mq_timedsend(r0, &(0x7f0000000140)="ffcf9f40d4866b64571196e7391a5f58f31b2a543f58f8eedb6dacb7a12096bb41f5627bb36e49a930cc0c1f92808c2bc1dce0370dd2028a1ab15cb3ca52108859b6b136d25ecbd36e6046e22d210b51c0e20e75c20d4a109d09398d72594d788fa244e157a5983e67908f2997e4aea214eb14b4a4756847bf9ea0eb9d8de2e69514511a05ecae41b336a367ed1abd14659f0c9a52f494a2936062aadf0ae9821e2f9475260f645ce4fb8d4eaab73f39f0a666c67d85d6b0d79ccc5d6dbc0b2589b3aee0e529af5197d7ef177e35ec6ec0b6a7e2d85e657a4aacfc3d", 0xdc, 0x20, &(0x7f0000000080)={r1, r2+10000000})

12:08:56 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 24)

12:08:56 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x81}, 0x2)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:08:56 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
r2 = syz_init_net_socket$llc(0x1a, 0x3, 0x0)
r3 = socket$isdn_base(0x22, 0x3, 0x0)
r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580), 0x8000, 0x0)
r5 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000006c0), 0x2, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180))
r7 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r7, &(0x7f0000000040), 0x2)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc020660b, &(0x7f0000000140))
r9 = socket$inet6_dccp(0xa, 0x6, 0x0)
r10 = openat$md(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0)
io_submit(r1, 0x9, &(0x7f0000000a40)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f0000000180)="24d81279533e1de6f26168ea4544e0dd6bdc45de6f9fad7f74ec2456ec64564e329644569340ad9db48b4b3fa5f82be76681c4a582ae890c38d1e0b8205e49af4b888fc4ad0d39315a53ac8cea5f08f26ae2ebcefe7b3016d16ecfaa87023ad67a3c3c18b7ae9a9258d0f23eeeaf92bdbd290a8dbf4d2b8f1e02e65bdbdaf65e63c89824c79a366fef92c1fd9f69d0b9dbc272d68a8d83321277d28a0e123cbb624659f9e22689aea4948b3177bf99f701e8b16b3c9f5fb49ab485b5e045fa1585491d6b294299061d54204ebca3ea48fec12971b9d9cc6b729c035e907cfeb04e57dc73539880a32b4ec92dfc4bc79a53f3506c415d9f", 0xf7, 0x9}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x4, r2, &(0x7f0000000280)="a04b043ea9eb18e7dc0ab807be5408d329579eefe220a6623f54109f1149983e338449fbc6901e8b1685bdace1cdae66ea5fcf4f2f5a4254a600a9db45b1042c0044c3482357a710136f225cd7b14b77177fec0633d56844006bef7feb997d108fad289e9d940918102d0c5aefa34a5162eae9f22a93917147cda59ea6f3c62cc83d1495224714ae95a4ba92e778e195b3ef3f6130358f81ebde1b1c9227eb67c833fc97", 0xa4, 0x5, 0x0, 0x2}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000340)="8ef715d871d1bbf2673eb85d7c9f3f4cc4b254392ccf8cc29c3384033de86f4ad084869f5525d4d660f2c41b63d91c5a45c85848f77b4a40e3bf025291b8a1f9f7ba54d18ddf96c597ea0913a54004d2e946db5e7315ab9f04a137560b2b1f57360475130c721d374f76aa0207f15c37d6d8030b85a7cac6947de284f44601a50846c2b19744879887dd15b88b9073ccadc4373547ad947569bd55f21c07deb7c51ca1917f150e3c2b535601af3e00be18b9606f7e4c297659dd58e37e67f75e9b1c4445d7207bd14fc0108092c1c4a7f954e504f2f29bb1d07a35cf249199444e81973122747d307e9bd8469cb4aa", 0xef, 0x3, 0x0, 0x2}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x8, r3, &(0x7f0000000440)="ce2f23a0ffb7768166d57357e9c55d474c5c93356cb5a8240eaa841e3a250b0519d076770d39cf035ef34ce5ac694537ed2b2bbdc37b02727bc5622df1d4eb6f13c3483861f018939c538c712a27a012f7669ef52aa6776c7df784bfa4884f440ec731a4e8fae0217e6b76104d1d6108d175745cf4377a39a74c866aadb51fc8485e0d0063673030bfd0ec6d234e2f8a9e2d717caafbf0313655b4ffc238e154624dcb659f99ee7184071480f18e0a63af3406be2591e451572eeb4b9e882bc67b7a2b05c185bec2096b41773cac02050ad32c52e61a9ba8183155b46d9967", 0xdf, 0x7fff}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x9, r4, &(0x7f00000005c0)="fe42995cd708e352a159918489c20a19e14c2a70a536a38d784648256779265c571c70580b4297f3bcbc24eb22bc0dab0146d2ce45c9a16253e11e0adca2cfb858b2f20073da3b9ec390ded7527ca5b4012f64584fa7c69df9b463ae2aeba2321316c23c027d2414c95c26a5008c4c08c2163b6747c3be08c867a2ec9177c7edacd8733162a157f78d4ce460326821a5a36b021a06ac4ae138f9ce8e4065c787d51b47683bcbc80b345618a4d9f7ce6c90f625485d0b1f069858d0f72d", 0xbd, 0x0, 0x0, 0x6}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x71, r5, &(0x7f0000000700)="3382a8a49f3d76ff36afc56c5d123e01dffbcd889968d64db276f5e055c1d4723c8b765910d397c8c47fc3ea93b0bc0dd6453c0a61febe912eaa7a9178f13d68c501f677c6c140c0c21002d1641c26dc90231a2e34308f703d02bced0c091b32b7dc99c3c897a6dae689777564c17e67e599a35f0dfaf27c5d2b82953acba7918cfb4000c0415f5757da37256dc021b7491fce76f61b789a86d7c6752eb32d70274d0055cd174f3a43f01e5439948f922ce2fd5fa8a96aca11be370856a777d672814bf1352d358f6eff41983eecfb6f505b7964e0d57de0c84db27590be6d593c67a12a456c", 0xe6, 0x60, 0x0, 0x2, r6}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x1, 0x40, r7, &(0x7f0000000840)="c43ededdceee6c48d0", 0x9, 0x6, 0x0, 0x1, r8}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x7, 0x3, r9, &(0x7f00000008c0)="b441f7bb83be1fa22bf48f33061744f2159bcf5837ec75", 0x17, 0x7}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x5, 0x8, r10, &(0x7f0000000980)="057e2299be048b9e13a3ea964f319e7b644caf90a6e859287dc74c93b3257349f959f9e60a7bb8babb21d9286eed930c12f7b2ffd6b971fb9d820234c348bc4d4ef8f2bef3d0104d4c9c3d52c1dbf0f0a2d63c3560ac9fb1d4d7772da33f45c71f642b00996f1adea9946f0e9f605c2224eafc03", 0x74, 0x7}])
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  290.498925] FAULT_INJECTION: forcing a failure.
[  290.498925] name failslab, interval 1, probability 0, space 0, times 0
[  290.514632] FAULT_INJECTION: forcing a failure.
[  290.514632] name failslab, interval 1, probability 0, space 0, times 0
[  290.540194] CPU: 0 PID: 17734 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  290.548437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  290.557869] Call Trace:
[  290.560446]  dump_stack+0x1b2/0x281
[  290.564066]  should_fail.cold+0x10a/0x149
[  290.568202]  should_failslab+0xd6/0x130
[  290.572165]  kmem_cache_alloc_node+0x263/0x410
[  290.576738]  __alloc_skb+0x5c/0x510
[  290.580356]  kobject_uevent_env+0x882/0xf30
[  290.584679]  lo_ioctl+0x11a6/0x1cd0
[  290.588298]  ? loop_set_status64+0xe0/0xe0
[  290.592518]  blkdev_ioctl+0x540/0x1830
[  290.596389]  ? blkpg_ioctl+0x8d0/0x8d0
[  290.600286]  ? trace_hardirqs_on+0x10/0x10
[  290.604530]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  290.609617]  ? debug_check_no_obj_freed+0x2c0/0x680
[  290.614632]  block_ioctl+0xd9/0x120
[  290.618241]  ? blkdev_fallocate+0x3a0/0x3a0
[  290.622554]  do_vfs_ioctl+0x75a/0xff0
[  290.626342]  ? lock_acquire+0x170/0x3f0
[  290.630395]  ? ioctl_preallocate+0x1a0/0x1a0
[  290.634795]  ? __fget+0x265/0x3e0
[  290.638241]  ? do_vfs_ioctl+0xff0/0xff0
[  290.642202]  ? security_file_ioctl+0x83/0xb0
[  290.646593]  SyS_ioctl+0x7f/0xb0
[  290.649939]  ? do_vfs_ioctl+0xff0/0xff0
[  290.653899]  do_syscall_64+0x1d5/0x640
[  290.657784]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  290.662957] RIP: 0033:0x7faf49caafc7
[  290.666653] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  290.675214] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  290.682465] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  290.689717] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  290.696965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  290.704214] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  290.723663] CPU: 0 PID: 17735 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  290.731557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  290.740931] Call Trace:
[  290.743518]  dump_stack+0x1b2/0x281
[  290.747157]  should_fail.cold+0x10a/0x149
[  290.751319]  should_failslab+0xd6/0x130
[  290.755298]  kmem_cache_alloc_trace+0x29a/0x3d0
[  290.759969]  ? dev_uevent_filter+0xd0/0xd0
[  290.764205]  kobject_uevent_env+0x20c/0xf30
[  290.768541]  ? internal_create_group+0x48f/0x710
[  290.773294]  lo_ioctl+0x11a6/0x1cd0
[  290.776914]  ? loop_set_status64+0xe0/0xe0
[  290.781143]  blkdev_ioctl+0x540/0x1830
[  290.785015]  ? blkpg_ioctl+0x8d0/0x8d0
[  290.788888]  ? trace_hardirqs_on+0x10/0x10
[  290.793115]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  290.798205]  ? debug_check_no_obj_freed+0x2c0/0x680
[  290.803301]  block_ioctl+0xd9/0x120
[  290.806911]  ? blkdev_fallocate+0x3a0/0x3a0
[  290.811217]  do_vfs_ioctl+0x75a/0xff0
[  290.815002]  ? lock_acquire+0x170/0x3f0
[  290.818964]  ? ioctl_preallocate+0x1a0/0x1a0
[  290.823371]  ? __fget+0x265/0x3e0
[  290.826814]  ? do_vfs_ioctl+0xff0/0xff0
[  290.830784]  ? security_file_ioctl+0x83/0xb0
[  290.835179]  SyS_ioctl+0x7f/0xb0
[  290.838525]  ? do_vfs_ioctl+0xff0/0xff0
[  290.842487]  do_syscall_64+0x1d5/0x640
12:08:57 executing program 5:
mq_open(&(0x7f0000006180)='}!\x00', 0x80, 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x3000, 0x80)
mq_timedreceive(r0, &(0x7f00000000c0)=""/15, 0xf, 0x20, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000100))
clock_gettime(0x0, &(0x7f0000000040)={<r1=>0x0, <r2=>0x0})
mq_timedsend(r0, &(0x7f0000000140)="ffcf9f40d4866b64571196e7391a5f58f31b2a543f58f8eedb6dacb7a12096bb41f5627bb36e49a930cc0c1f92808c2bc1dce0370dd2028a1ab15cb3ca52108859b6b136d25ecbd36e6046e22d210b51c0e20e75c20d4a109d09398d72594d788fa244e157a5983e67908f2997e4aea214eb14b4a4756847bf9ea0eb9d8de2e69514511a05ecae41b336a367ed1abd14659f0c9a52f494a2936062aadf0ae9821e2f9475260f645ce4fb8d4eaab73f39f0a666c67d85d6b0d79ccc5d6dbc0b2589b3aee0e529af5197d7ef177e35ec6ec0b6a7e2d85e657a4aacfc3d", 0xdc, 0x20, &(0x7f0000000080)={r1, r2+10000000})
mq_open(&(0x7f0000006180)='}!\x00', 0x80, 0x0, 0x0) (async)
open(&(0x7f0000000000)='./file0\x00', 0x3000, 0x80) (async)
mq_timedreceive(r0, &(0x7f00000000c0)=""/15, 0xf, 0x20, 0x0) (async)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000100)) (async)
clock_gettime(0x0, &(0x7f0000000040)) (async)
mq_timedsend(r0, &(0x7f0000000140)="ffcf9f40d4866b64571196e7391a5f58f31b2a543f58f8eedb6dacb7a12096bb41f5627bb36e49a930cc0c1f92808c2bc1dce0370dd2028a1ab15cb3ca52108859b6b136d25ecbd36e6046e22d210b51c0e20e75c20d4a109d09398d72594d788fa244e157a5983e67908f2997e4aea214eb14b4a4756847bf9ea0eb9d8de2e69514511a05ecae41b336a367ed1abd14659f0c9a52f494a2936062aadf0ae9821e2f9475260f645ce4fb8d4eaab73f39f0a666c67d85d6b0d79ccc5d6dbc0b2589b3aee0e529af5197d7ef177e35ec6ec0b6a7e2d85e657a4aacfc3d", 0xdc, 0x20, &(0x7f0000000080)={r1, r2+10000000}) (async)

[  290.846368]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  290.851557] RIP: 0033:0x7f5c30cedfc7
[  290.855271] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  290.862963] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  290.870215] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  290.877464] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  290.884712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  290.891968] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:08:57 executing program 5:
mq_open(&(0x7f0000006180)='}!\x00', 0x80, 0x0, 0x0) (async)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x3000, 0x80)
mq_timedreceive(r0, &(0x7f00000000c0)=""/15, 0xf, 0x20, 0x0) (async)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000100)) (async)
clock_gettime(0x0, &(0x7f0000000040)={<r1=>0x0, <r2=>0x0})
mq_timedsend(r0, &(0x7f0000000140)="ffcf9f40d4866b64571196e7391a5f58f31b2a543f58f8eedb6dacb7a12096bb41f5627bb36e49a930cc0c1f92808c2bc1dce0370dd2028a1ab15cb3ca52108859b6b136d25ecbd36e6046e22d210b51c0e20e75c20d4a109d09398d72594d788fa244e157a5983e67908f2997e4aea214eb14b4a4756847bf9ea0eb9d8de2e69514511a05ecae41b336a367ed1abd14659f0c9a52f494a2936062aadf0ae9821e2f9475260f645ce4fb8d4eaab73f39f0a666c67d85d6b0d79ccc5d6dbc0b2589b3aee0e529af5197d7ef177e35ec6ec0b6a7e2d85e657a4aacfc3d", 0xdc, 0x20, &(0x7f0000000080)={r1, r2+10000000})

[  290.926565] vxfs: WRONG superblock magic 00000000 at 1
[  290.942978] vxfs: WRONG superblock magic 00000000 at 1
[  290.950922] vxfs: WRONG superblock magic 00000000 at 8
[  290.959767] vxfs: can't find superblock.
12:08:57 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x40001, 0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0x3f, 0x80, 0xde, 0x0, 0x3, 0x2000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xffff, 0x1000}, 0x10000, 0x4, 0x3, 0x0, 0x1, 0x4, 0x800, 0x0, 0x7, 0x0, 0x2bf1c95d}, 0xffffffffffffffff, 0x2, r1, 0x9)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x40001, 0x0) (async)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0x3f, 0x80, 0xde, 0x0, 0x3, 0x2000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xffff, 0x1000}, 0x10000, 0x4, 0x3, 0x0, 0x1, 0x4, 0x800, 0x0, 0x7, 0x0, 0x2bf1c95d}, 0xffffffffffffffff, 0x2, r1, 0x9) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

12:08:57 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 25)

12:08:57 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 19)

12:08:57 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x40001, 0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0x3f, 0x80, 0xde, 0x0, 0x3, 0x2000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xffff, 0x1000}, 0x10000, 0x4, 0x3, 0x0, 0x1, 0x4, 0x800, 0x0, 0x7, 0x0, 0x2bf1c95d}, 0xffffffffffffffff, 0x2, r1, 0x9)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x40001, 0x0) (async)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0x3f, 0x80, 0xde, 0x0, 0x3, 0x2000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xffff, 0x1000}, 0x10000, 0x4, 0x3, 0x0, 0x1, 0x4, 0x800, 0x0, 0x7, 0x0, 0x2bf1c95d}, 0xffffffffffffffff, 0x2, r1, 0x9) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

[  290.977382] vxfs: WRONG superblock magic 00000000 at 8
[  290.984065] vxfs: can't find superblock.
12:08:57 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x8, 0x9, 0x7, 0x0, 0x7ff, 0x8200, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={&(0x7f0000000100)}, 0x40, 0x8, 0x80000001, 0x6, 0xffffffffffffff60, 0xeaf1, 0x5, 0x0, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r0, 0x9)
preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/220, 0xdc}], 0x3, 0x9, 0x9e)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r1, &(0x7f0000000000)="76a9b63ac0edc1a0cb9d41ddc51c240ab5d8910a404396da9e44a6299700d648524d411765811796e9970041ee647899", 0x30, 0xfffffffffffffff7, &(0x7f00000000c0)={0x77359400})

[  291.063798] FAULT_INJECTION: forcing a failure.
[  291.063798] name failslab, interval 1, probability 0, space 0, times 0
[  291.076697] FAULT_INJECTION: forcing a failure.
[  291.076697] name failslab, interval 1, probability 0, space 0, times 0
[  291.087308] CPU: 0 PID: 17779 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  291.095778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  291.105233] Call Trace:
[  291.107816]  dump_stack+0x1b2/0x281
[  291.111484]  should_fail.cold+0x10a/0x149
[  291.115634]  should_failslab+0xd6/0x130
[  291.119615]  kmem_cache_alloc_node_trace+0x25a/0x400
[  291.124727]  __kmalloc_node_track_caller+0x38/0x70
[  291.129658]  __alloc_skb+0x96/0x510
[  291.133277]  kobject_uevent_env+0x882/0xf30
[  291.137591]  lo_ioctl+0x11a6/0x1cd0
[  291.141205]  ? loop_set_status64+0xe0/0xe0
[  291.145426]  blkdev_ioctl+0x540/0x1830
[  291.149300]  ? blkpg_ioctl+0x8d0/0x8d0
[  291.153174]  ? trace_hardirqs_on+0x10/0x10
[  291.157398]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  291.162483]  ? debug_check_no_obj_freed+0x2c0/0x680
[  291.167490]  block_ioctl+0xd9/0x120
[  291.171112]  ? blkdev_fallocate+0x3a0/0x3a0
[  291.175418]  do_vfs_ioctl+0x75a/0xff0
[  291.179202]  ? lock_acquire+0x170/0x3f0
[  291.183181]  ? ioctl_preallocate+0x1a0/0x1a0
[  291.187594]  ? __fget+0x265/0x3e0
[  291.191050]  ? do_vfs_ioctl+0xff0/0xff0
[  291.195014]  ? security_file_ioctl+0x83/0xb0
[  291.199428]  SyS_ioctl+0x7f/0xb0
[  291.202784]  ? do_vfs_ioctl+0xff0/0xff0
[  291.206761]  do_syscall_64+0x1d5/0x640
[  291.210654]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  291.215838] RIP: 0033:0x7faf49caafc7
[  291.219534] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  291.227228] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  291.234479] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  291.241816] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  291.249068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  291.256319] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  291.268398] CPU: 1 PID: 17782 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  291.276296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  291.285646] Call Trace:
[  291.288242]  dump_stack+0x1b2/0x281
[  291.291882]  should_fail.cold+0x10a/0x149
[  291.294879] vxfs: WRONG superblock magic 00000000 at 1
[  291.296032]  should_failslab+0xd6/0x130
[  291.296047]  __kmalloc+0x2c1/0x400
[  291.296058]  ? kobject_get_path+0xb5/0x230
[  291.296072]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  291.301676] vxfs: WRONG superblock magic 00000000 at 8
[  291.305314]  kobject_get_path+0xb5/0x230
[  291.305332]  kobject_uevent_env+0x230/0xf30
[  291.305347]  ? internal_create_group+0x48f/0x710
[  291.305364]  lo_ioctl+0x11a6/0x1cd0
[  291.305380]  ? loop_set_status64+0xe0/0xe0
[  291.305394]  blkdev_ioctl+0x540/0x1830
[  291.305406]  ? blkpg_ioctl+0x8d0/0x8d0
[  291.314600] vxfs: can't find superblock.
[  291.318588]  ? trace_hardirqs_on+0x10/0x10
[  291.318607]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  291.318620]  ? debug_check_no_obj_freed+0x2c0/0x680
[  291.318637]  block_ioctl+0xd9/0x120
[  291.375043]  ? blkdev_fallocate+0x3a0/0x3a0
[  291.379377]  do_vfs_ioctl+0x75a/0xff0
[  291.383171]  ? lock_acquire+0x170/0x3f0
[  291.387138]  ? ioctl_preallocate+0x1a0/0x1a0
[  291.391547]  ? __fget+0x265/0x3e0
[  291.394998]  ? do_vfs_ioctl+0xff0/0xff0
[  291.398954]  ? security_file_ioctl+0x83/0xb0
[  291.403344]  SyS_ioctl+0x7f/0xb0
[  291.406698]  ? do_vfs_ioctl+0xff0/0xff0
[  291.410653]  do_syscall_64+0x1d5/0x640
[  291.414527]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  291.419783] RIP: 0033:0x7f5c30cedfc7
[  291.423474] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  291.431175] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  291.438423] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  291.445677] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  291.453029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  291.460289] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:08:57 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x81}, 0x2) (async)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:08:57 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xe7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x0, 0x6, 0xcb, 0x0, 0x8, 0x0, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_bp, 0x10e, 0xfffffffffffffffd, 0x6e, 0x6, 0x1, 0x4, 0x3, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0xb, r0, 0x4)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r2, 0x8, 0x2, 0x8001, 0x744})
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f00000000c0)={0x2, 0x40}, 0x2)

12:08:57 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x8, 0x9, 0x7, 0x0, 0x7ff, 0x8200, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={&(0x7f0000000100)}, 0x40, 0x8, 0x80000001, 0x6, 0xffffffffffffff60, 0xeaf1, 0x5, 0x0, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r0, 0x9)
preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/220, 0xdc}], 0x3, 0x9, 0x9e)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r1, &(0x7f0000000000)="76a9b63ac0edc1a0cb9d41ddc51c240ab5d8910a404396da9e44a6299700d648524d411765811796e9970041ee647899", 0x30, 0xfffffffffffffff7, &(0x7f00000000c0)={0x77359400})
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x8, 0x9, 0x7, 0x0, 0x7ff, 0x8200, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={&(0x7f0000000100)}, 0x40, 0x8, 0x80000001, 0x6, 0xffffffffffffff60, 0xeaf1, 0x5, 0x0, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r0, 0x9) (async)
preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/220, 0xdc}], 0x3, 0x9, 0x9e) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
mq_timedsend(r1, &(0x7f0000000000)="76a9b63ac0edc1a0cb9d41ddc51c240ab5d8910a404396da9e44a6299700d648524d411765811796e9970041ee647899", 0x30, 0xfffffffffffffff7, &(0x7f00000000c0)={0x77359400}) (async)

12:08:57 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 26)

[  291.482413] vxfs: WRONG superblock magic 00000000 at 1
[  291.488325] vxfs: WRONG superblock magic 00000000 at 8
[  291.497815] vxfs: can't find superblock.
12:08:57 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0) (async, rerun: 64)
r2 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) (async)
r3 = socket$isdn_base(0x22, 0x3, 0x0) (async, rerun: 64)
r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580), 0x8000, 0x0) (async, rerun: 64)
r5 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000006c0), 0x2, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180)) (async)
r7 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r7, &(0x7f0000000040), 0x2) (async)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc020660b, &(0x7f0000000140)) (async)
r9 = socket$inet6_dccp(0xa, 0x6, 0x0) (async)
r10 = openat$md(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0)
io_submit(r1, 0x9, &(0x7f0000000a40)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f0000000180)="24d81279533e1de6f26168ea4544e0dd6bdc45de6f9fad7f74ec2456ec64564e329644569340ad9db48b4b3fa5f82be76681c4a582ae890c38d1e0b8205e49af4b888fc4ad0d39315a53ac8cea5f08f26ae2ebcefe7b3016d16ecfaa87023ad67a3c3c18b7ae9a9258d0f23eeeaf92bdbd290a8dbf4d2b8f1e02e65bdbdaf65e63c89824c79a366fef92c1fd9f69d0b9dbc272d68a8d83321277d28a0e123cbb624659f9e22689aea4948b3177bf99f701e8b16b3c9f5fb49ab485b5e045fa1585491d6b294299061d54204ebca3ea48fec12971b9d9cc6b729c035e907cfeb04e57dc73539880a32b4ec92dfc4bc79a53f3506c415d9f", 0xf7, 0x9}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x4, r2, &(0x7f0000000280)="a04b043ea9eb18e7dc0ab807be5408d329579eefe220a6623f54109f1149983e338449fbc6901e8b1685bdace1cdae66ea5fcf4f2f5a4254a600a9db45b1042c0044c3482357a710136f225cd7b14b77177fec0633d56844006bef7feb997d108fad289e9d940918102d0c5aefa34a5162eae9f22a93917147cda59ea6f3c62cc83d1495224714ae95a4ba92e778e195b3ef3f6130358f81ebde1b1c9227eb67c833fc97", 0xa4, 0x5, 0x0, 0x2}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000340)="8ef715d871d1bbf2673eb85d7c9f3f4cc4b254392ccf8cc29c3384033de86f4ad084869f5525d4d660f2c41b63d91c5a45c85848f77b4a40e3bf025291b8a1f9f7ba54d18ddf96c597ea0913a54004d2e946db5e7315ab9f04a137560b2b1f57360475130c721d374f76aa0207f15c37d6d8030b85a7cac6947de284f44601a50846c2b19744879887dd15b88b9073ccadc4373547ad947569bd55f21c07deb7c51ca1917f150e3c2b535601af3e00be18b9606f7e4c297659dd58e37e67f75e9b1c4445d7207bd14fc0108092c1c4a7f954e504f2f29bb1d07a35cf249199444e81973122747d307e9bd8469cb4aa", 0xef, 0x3, 0x0, 0x2}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x8, r3, &(0x7f0000000440)="ce2f23a0ffb7768166d57357e9c55d474c5c93356cb5a8240eaa841e3a250b0519d076770d39cf035ef34ce5ac694537ed2b2bbdc37b02727bc5622df1d4eb6f13c3483861f018939c538c712a27a012f7669ef52aa6776c7df784bfa4884f440ec731a4e8fae0217e6b76104d1d6108d175745cf4377a39a74c866aadb51fc8485e0d0063673030bfd0ec6d234e2f8a9e2d717caafbf0313655b4ffc238e154624dcb659f99ee7184071480f18e0a63af3406be2591e451572eeb4b9e882bc67b7a2b05c185bec2096b41773cac02050ad32c52e61a9ba8183155b46d9967", 0xdf, 0x7fff}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x9, r4, &(0x7f00000005c0)="fe42995cd708e352a159918489c20a19e14c2a70a536a38d784648256779265c571c70580b4297f3bcbc24eb22bc0dab0146d2ce45c9a16253e11e0adca2cfb858b2f20073da3b9ec390ded7527ca5b4012f64584fa7c69df9b463ae2aeba2321316c23c027d2414c95c26a5008c4c08c2163b6747c3be08c867a2ec9177c7edacd8733162a157f78d4ce460326821a5a36b021a06ac4ae138f9ce8e4065c787d51b47683bcbc80b345618a4d9f7ce6c90f625485d0b1f069858d0f72d", 0xbd, 0x0, 0x0, 0x6}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x71, r5, &(0x7f0000000700)="3382a8a49f3d76ff36afc56c5d123e01dffbcd889968d64db276f5e055c1d4723c8b765910d397c8c47fc3ea93b0bc0dd6453c0a61febe912eaa7a9178f13d68c501f677c6c140c0c21002d1641c26dc90231a2e34308f703d02bced0c091b32b7dc99c3c897a6dae689777564c17e67e599a35f0dfaf27c5d2b82953acba7918cfb4000c0415f5757da37256dc021b7491fce76f61b789a86d7c6752eb32d70274d0055cd174f3a43f01e5439948f922ce2fd5fa8a96aca11be370856a777d672814bf1352d358f6eff41983eecfb6f505b7964e0d57de0c84db27590be6d593c67a12a456c", 0xe6, 0x60, 0x0, 0x2, r6}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x1, 0x40, r7, &(0x7f0000000840)="c43ededdceee6c48d0", 0x9, 0x6, 0x0, 0x1, r8}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x7, 0x3, r9, &(0x7f00000008c0)="b441f7bb83be1fa22bf48f33061744f2159bcf5837ec75", 0x17, 0x7}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x5, 0x8, r10, &(0x7f0000000980)="057e2299be048b9e13a3ea964f319e7b644caf90a6e859287dc74c93b3257349f959f9e60a7bb8babb21d9286eed930c12f7b2ffd6b971fb9d820234c348bc4d4ef8f2bef3d0104d4c9c3d52c1dbf0f0a2d63c3560ac9fb1d4d7772da33f45c71f642b00996f1adea9946f0e9f605c2224eafc03", 0x74, 0x7}]) (async)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:08:57 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 20)

[  291.561224] FAULT_INJECTION: forcing a failure.
[  291.561224] name failslab, interval 1, probability 0, space 0, times 0
[  291.595713] misc userio: No port type given on /dev/userio
[  291.598640] CPU: 0 PID: 17806 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  291.609245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  291.618600] Call Trace:
[  291.621195]  dump_stack+0x1b2/0x281
[  291.621651] misc userio: The device must be registered before sending interrupts
[  291.624857]  should_fail.cold+0x10a/0x149
[  291.624874]  should_failslab+0xd6/0x130
[  291.624887]  kmem_cache_alloc_node_trace+0x25a/0x400
[  291.624900]  __kmalloc_node_track_caller+0x38/0x70
[  291.624912]  __alloc_skb+0x96/0x510
[  291.624927]  kobject_uevent_env+0x882/0xf30
[  291.624945]  lo_ioctl+0x11a6/0x1cd0
[  291.624959]  ? loop_set_status64+0xe0/0xe0
[  291.624973]  blkdev_ioctl+0x540/0x1830
[  291.624984]  ? blkpg_ioctl+0x8d0/0x8d0
[  291.624993]  ? trace_hardirqs_on+0x10/0x10
[  291.625006]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  291.625018]  ? debug_check_no_obj_freed+0x2c0/0x680
[  291.688529]  block_ioctl+0xd9/0x120
[  291.692177]  ? blkdev_fallocate+0x3a0/0x3a0
[  291.696486]  do_vfs_ioctl+0x75a/0xff0
[  291.700290]  ? lock_acquire+0x170/0x3f0
[  291.704259]  ? ioctl_preallocate+0x1a0/0x1a0
[  291.708655]  ? __fget+0x265/0x3e0
[  291.712095]  ? do_vfs_ioctl+0xff0/0xff0
[  291.716053]  ? security_file_ioctl+0x83/0xb0
[  291.720446]  SyS_ioctl+0x7f/0xb0
[  291.723805]  ? do_vfs_ioctl+0xff0/0xff0
[  291.727773]  do_syscall_64+0x1d5/0x640
[  291.731824]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  291.736996] RIP: 0033:0x7faf49caafc7
[  291.740692] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  291.748470] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
12:08:58 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x81}, 0x2)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x81}, 0x2) (async)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)

[  291.755724] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  291.762996] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  291.770245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  291.777496] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  291.791703] Bluetooth: hci5 command 0x0406 tx timeout
12:08:58 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x8, 0x9, 0x7, 0x0, 0x7ff, 0x8200, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={&(0x7f0000000100)}, 0x40, 0x8, 0x80000001, 0x6, 0xffffffffffffff60, 0xeaf1, 0x5, 0x0, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r0, 0x9) (async)
preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/220, 0xdc}], 0x3, 0x9, 0x9e) (async, rerun: 32)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (rerun: 32)
mq_timedsend(r1, &(0x7f0000000000)="76a9b63ac0edc1a0cb9d41ddc51c240ab5d8910a404396da9e44a6299700d648524d411765811796e9970041ee647899", 0x30, 0xfffffffffffffff7, &(0x7f00000000c0)={0x77359400})

12:08:58 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0) (async)
r2 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) (async)
r3 = socket$isdn_base(0x22, 0x3, 0x0) (async)
r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580), 0x8000, 0x0)
r5 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000006c0), 0x2, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180)) (async, rerun: 32)
r7 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (rerun: 32)
write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r7, &(0x7f0000000040), 0x2) (async)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc020660b, &(0x7f0000000140)) (async)
r9 = socket$inet6_dccp(0xa, 0x6, 0x0) (async, rerun: 32)
r10 = openat$md(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0) (rerun: 32)
io_submit(r1, 0x9, &(0x7f0000000a40)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f0000000180)="24d81279533e1de6f26168ea4544e0dd6bdc45de6f9fad7f74ec2456ec64564e329644569340ad9db48b4b3fa5f82be76681c4a582ae890c38d1e0b8205e49af4b888fc4ad0d39315a53ac8cea5f08f26ae2ebcefe7b3016d16ecfaa87023ad67a3c3c18b7ae9a9258d0f23eeeaf92bdbd290a8dbf4d2b8f1e02e65bdbdaf65e63c89824c79a366fef92c1fd9f69d0b9dbc272d68a8d83321277d28a0e123cbb624659f9e22689aea4948b3177bf99f701e8b16b3c9f5fb49ab485b5e045fa1585491d6b294299061d54204ebca3ea48fec12971b9d9cc6b729c035e907cfeb04e57dc73539880a32b4ec92dfc4bc79a53f3506c415d9f", 0xf7, 0x9}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x4, r2, &(0x7f0000000280)="a04b043ea9eb18e7dc0ab807be5408d329579eefe220a6623f54109f1149983e338449fbc6901e8b1685bdace1cdae66ea5fcf4f2f5a4254a600a9db45b1042c0044c3482357a710136f225cd7b14b77177fec0633d56844006bef7feb997d108fad289e9d940918102d0c5aefa34a5162eae9f22a93917147cda59ea6f3c62cc83d1495224714ae95a4ba92e778e195b3ef3f6130358f81ebde1b1c9227eb67c833fc97", 0xa4, 0x5, 0x0, 0x2}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000340)="8ef715d871d1bbf2673eb85d7c9f3f4cc4b254392ccf8cc29c3384033de86f4ad084869f5525d4d660f2c41b63d91c5a45c85848f77b4a40e3bf025291b8a1f9f7ba54d18ddf96c597ea0913a54004d2e946db5e7315ab9f04a137560b2b1f57360475130c721d374f76aa0207f15c37d6d8030b85a7cac6947de284f44601a50846c2b19744879887dd15b88b9073ccadc4373547ad947569bd55f21c07deb7c51ca1917f150e3c2b535601af3e00be18b9606f7e4c297659dd58e37e67f75e9b1c4445d7207bd14fc0108092c1c4a7f954e504f2f29bb1d07a35cf249199444e81973122747d307e9bd8469cb4aa", 0xef, 0x3, 0x0, 0x2}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x8, r3, &(0x7f0000000440)="ce2f23a0ffb7768166d57357e9c55d474c5c93356cb5a8240eaa841e3a250b0519d076770d39cf035ef34ce5ac694537ed2b2bbdc37b02727bc5622df1d4eb6f13c3483861f018939c538c712a27a012f7669ef52aa6776c7df784bfa4884f440ec731a4e8fae0217e6b76104d1d6108d175745cf4377a39a74c866aadb51fc8485e0d0063673030bfd0ec6d234e2f8a9e2d717caafbf0313655b4ffc238e154624dcb659f99ee7184071480f18e0a63af3406be2591e451572eeb4b9e882bc67b7a2b05c185bec2096b41773cac02050ad32c52e61a9ba8183155b46d9967", 0xdf, 0x7fff}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x9, r4, &(0x7f00000005c0)="fe42995cd708e352a159918489c20a19e14c2a70a536a38d784648256779265c571c70580b4297f3bcbc24eb22bc0dab0146d2ce45c9a16253e11e0adca2cfb858b2f20073da3b9ec390ded7527ca5b4012f64584fa7c69df9b463ae2aeba2321316c23c027d2414c95c26a5008c4c08c2163b6747c3be08c867a2ec9177c7edacd8733162a157f78d4ce460326821a5a36b021a06ac4ae138f9ce8e4065c787d51b47683bcbc80b345618a4d9f7ce6c90f625485d0b1f069858d0f72d", 0xbd, 0x0, 0x0, 0x6}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x71, r5, &(0x7f0000000700)="3382a8a49f3d76ff36afc56c5d123e01dffbcd889968d64db276f5e055c1d4723c8b765910d397c8c47fc3ea93b0bc0dd6453c0a61febe912eaa7a9178f13d68c501f677c6c140c0c21002d1641c26dc90231a2e34308f703d02bced0c091b32b7dc99c3c897a6dae689777564c17e67e599a35f0dfaf27c5d2b82953acba7918cfb4000c0415f5757da37256dc021b7491fce76f61b789a86d7c6752eb32d70274d0055cd174f3a43f01e5439948f922ce2fd5fa8a96aca11be370856a777d672814bf1352d358f6eff41983eecfb6f505b7964e0d57de0c84db27590be6d593c67a12a456c", 0xe6, 0x60, 0x0, 0x2, r6}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x1, 0x40, r7, &(0x7f0000000840)="c43ededdceee6c48d0", 0x9, 0x6, 0x0, 0x1, r8}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x7, 0x3, r9, &(0x7f00000008c0)="b441f7bb83be1fa22bf48f33061744f2159bcf5837ec75", 0x17, 0x7}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x5, 0x8, r10, &(0x7f0000000980)="057e2299be048b9e13a3ea964f319e7b644caf90a6e859287dc74c93b3257349f959f9e60a7bb8babb21d9286eed930c12f7b2ffd6b971fb9d820234c348bc4d4ef8f2bef3d0104d4c9c3d52c1dbf0f0a2d63c3560ac9fb1d4d7772da33f45c71f642b00996f1adea9946f0e9f605c2224eafc03", 0x74, 0x7}])
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  291.817517] FAULT_INJECTION: forcing a failure.
[  291.817517] name failslab, interval 1, probability 0, space 0, times 0
[  291.833490] vxfs: WRONG superblock magic 00000000 at 1
[  291.841282] CPU: 1 PID: 17818 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  291.849159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  291.858515] Call Trace:
[  291.861102]  dump_stack+0x1b2/0x281
[  291.864735]  should_fail.cold+0x10a/0x149
[  291.868888]  should_failslab+0xd6/0x130
[  291.872863]  kmem_cache_alloc_node+0x263/0x410
[  291.877455]  __alloc_skb+0x5c/0x510
[  291.881079]  kobject_uevent_env+0x882/0xf30
[  291.883355] vxfs: WRONG superblock magic 00000000 at 8
[  291.885404]  lo_ioctl+0x11a6/0x1cd0
[  291.885420]  ? loop_set_status64+0xe0/0xe0
[  291.885433]  blkdev_ioctl+0x540/0x1830
[  291.885446]  ? blkpg_ioctl+0x8d0/0x8d0
[  291.894207] vxfs: can't find superblock.
[  291.894319]  ? perf_trace_lock+0xf7/0x490
[  291.914455]  ? perf_trace_lock_acquire+0x510/0x510
[  291.919385]  block_ioctl+0xd9/0x120
[  291.922999]  ? blkdev_fallocate+0x3a0/0x3a0
[  291.927305]  do_vfs_ioctl+0x75a/0xff0
[  291.931092]  ? lock_acquire+0x170/0x3f0
[  291.935051]  ? ioctl_preallocate+0x1a0/0x1a0
[  291.939448]  ? __fget+0x265/0x3e0
[  291.942973]  ? do_vfs_ioctl+0xff0/0xff0
[  291.946942]  ? security_file_ioctl+0x83/0xb0
[  291.951336]  SyS_ioctl+0x7f/0xb0
[  291.954687]  ? do_vfs_ioctl+0xff0/0xff0
[  291.958647]  do_syscall_64+0x1d5/0x640
[  291.962528]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  291.967702] RIP: 0033:0x7f5c30cedfc7
[  291.971394] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  291.979088] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  291.986357] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  291.993608] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  292.000866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  292.008125] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:08:58 executing program 5:
sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"/268], 0x20}}, 0x4)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x80000000, 0x5}, 0x40000, 0xfffffffffffffffc, 0xfffffffe, 0x8, 0x0, 0x2, 0x0, 0x0, 0x4000000, 0x0, 0xbce9}, 0x0, 0xc, 0xffffffffffffffff, 0x8)
r0 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r0, &(0x7f00000000c0)="39ed39bc492ef9a401b41f5ce789b10e677bd76cc6e624cd447fb970da07428718d77a90e30d0b370a87373c8bf15da8020b1fe74d91523022d8ce7162124fae4c7291c5a4b059447ea15f635f44916b564afe569775173c1b9c0964e05b7eced99e64a9ac5625e126e495e901f684bbc83f7f94cdd24abf3e50fe9b4676b851d997e05d7fbc1772159c6623ab6559870dc9f210d14d8ef1a40b1031a008619b3b1c1bbe44a171f79bf6d367eb62afe0dd8856355999d64fecfa92657880c6a7c2d6cb4ec91cdd28dda725398c285e4ebf5aedbe44e46f3154a95faae512", 0xde, 0x6, &(0x7f0000000000)={0x0, 0x989680})

12:08:58 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 27)

12:08:58 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 21)

[  292.022203] vxfs: WRONG superblock magic 00000000 at 1
[  292.028356] vxfs: WRONG superblock magic 00000000 at 8
[  292.034361] vxfs: can't find superblock.
12:08:58 executing program 5:
sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"/268], 0x20}}, 0x4) (async, rerun: 64)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x80000000, 0x5}, 0x40000, 0xfffffffffffffffc, 0xfffffffe, 0x8, 0x0, 0x2, 0x0, 0x0, 0x4000000, 0x0, 0xbce9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) (async, rerun: 64)
r0 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r0, &(0x7f00000000c0)="39ed39bc492ef9a401b41f5ce789b10e677bd76cc6e624cd447fb970da07428718d77a90e30d0b370a87373c8bf15da8020b1fe74d91523022d8ce7162124fae4c7291c5a4b059447ea15f635f44916b564afe569775173c1b9c0964e05b7eced99e64a9ac5625e126e495e901f684bbc83f7f94cdd24abf3e50fe9b4676b851d997e05d7fbc1772159c6623ab6559870dc9f210d14d8ef1a40b1031a008619b3b1c1bbe44a171f79bf6d367eb62afe0dd8856355999d64fecfa92657880c6a7c2d6cb4ec91cdd28dda725398c285e4ebf5aedbe44e46f3154a95faae512", 0xde, 0x6, &(0x7f0000000000)={0x0, 0x989680})

[  292.099579] FAULT_INJECTION: forcing a failure.
[  292.099579] name failslab, interval 1, probability 0, space 0, times 0
[  292.116582] CPU: 1 PID: 17859 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  292.124481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  292.133828] Call Trace:
[  292.136421]  dump_stack+0x1b2/0x281
[  292.140037]  should_fail.cold+0x10a/0x149
[  292.144172]  should_failslab+0xd6/0x130
[  292.148152]  kmem_cache_alloc_node+0x263/0x410
[  292.152717]  __alloc_skb+0x5c/0x510
[  292.156325]  kobject_uevent_env+0x882/0xf30
[  292.160634]  lo_ioctl+0x11a6/0x1cd0
[  292.164246]  ? loop_set_status64+0xe0/0xe0
[  292.168472]  blkdev_ioctl+0x540/0x1830
[  292.172344]  ? blkpg_ioctl+0x8d0/0x8d0
[  292.176215]  ? trace_hardirqs_on+0x10/0x10
[  292.180437]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  292.185535]  ? debug_check_no_obj_freed+0x2c0/0x680
[  292.190545]  block_ioctl+0xd9/0x120
[  292.194154]  ? blkdev_fallocate+0x3a0/0x3a0
[  292.198461]  do_vfs_ioctl+0x75a/0xff0
[  292.202246]  ? lock_acquire+0x170/0x3f0
[  292.206221]  ? ioctl_preallocate+0x1a0/0x1a0
[  292.210640]  ? __fget+0x265/0x3e0
[  292.214083]  ? do_vfs_ioctl+0xff0/0xff0
[  292.218040]  ? security_file_ioctl+0x83/0xb0
[  292.222441]  SyS_ioctl+0x7f/0xb0
[  292.225801]  ? do_vfs_ioctl+0xff0/0xff0
[  292.229761]  do_syscall_64+0x1d5/0x640
[  292.233635]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  292.238820] RIP: 0033:0x7f5c30cedfc7
[  292.242507] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  292.250194] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  292.257442] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  292.264693] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  292.271939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  292.279621] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  292.296425] vxfs: WRONG superblock magic 00000000 at 1
[  292.302922] FAULT_INJECTION: forcing a failure.
[  292.302922] name failslab, interval 1, probability 0, space 0, times 0
[  292.309678] vxfs: WRONG superblock magic 00000000 at 8
[  292.324640] CPU: 0 PID: 17861 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  292.328594] vxfs: can't find superblock.
[  292.332542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  292.332547] Call Trace:
[  292.332564]  dump_stack+0x1b2/0x281
[  292.332578]  should_fail.cold+0x10a/0x149
[  292.356272]  should_failslab+0xd6/0x130
[  292.360233]  kmem_cache_alloc_node+0x263/0x410
[  292.364806]  __alloc_skb+0x5c/0x510
[  292.368421]  kobject_uevent_env+0x882/0xf30
[  292.372726]  lo_ioctl+0x11a6/0x1cd0
[  292.376332]  ? loop_set_status64+0xe0/0xe0
[  292.380545]  blkdev_ioctl+0x540/0x1830
[  292.384416]  ? blkpg_ioctl+0x8d0/0x8d0
[  292.388291]  ? trace_hardirqs_on+0x10/0x10
[  292.392504]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  292.397599]  ? debug_check_no_obj_freed+0x2c0/0x680
[  292.402611]  block_ioctl+0xd9/0x120
[  292.406235]  ? blkdev_fallocate+0x3a0/0x3a0
[  292.410649]  do_vfs_ioctl+0x75a/0xff0
[  292.414517]  ? lock_acquire+0x170/0x3f0
[  292.418472]  ? ioctl_preallocate+0x1a0/0x1a0
[  292.422868]  ? __fget+0x265/0x3e0
[  292.426313]  ? do_vfs_ioctl+0xff0/0xff0
[  292.430275]  ? security_file_ioctl+0x83/0xb0
[  292.434660]  SyS_ioctl+0x7f/0xb0
[  292.438003]  ? do_vfs_ioctl+0xff0/0xff0
[  292.441956]  do_syscall_64+0x1d5/0x640
[  292.445844]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  292.451027] RIP: 0033:0x7faf49caafc7
[  292.454716] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  292.462401] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  292.469653] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  292.476903] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  292.484157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  292.491434] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  292.502030] vxfs: WRONG superblock magic 00000000 at 1
[  292.515390] vxfs: WRONG superblock magic 00000000 at 8
[  292.520850] vxfs: can't find superblock.
12:08:59 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xe7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x0, 0x6, 0xcb, 0x0, 0x8, 0x0, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_bp, 0x10e, 0xfffffffffffffffd, 0x6e, 0x6, 0x1, 0x4, 0x3, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0xb, r0, 0x4) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async, rerun: 32)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2) (async, rerun: 32)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r2, 0x8, 0x2, 0x8001, 0x744}) (async)
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f00000000c0)={0x2, 0x40}, 0x2)

12:08:59 executing program 5:
sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"/268], 0x20}}, 0x4)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x80000000, 0x5}, 0x40000, 0xfffffffffffffffc, 0xfffffffe, 0x8, 0x0, 0x2, 0x0, 0x0, 0x4000000, 0x0, 0xbce9}, 0x0, 0xc, 0xffffffffffffffff, 0x8)
r0 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r0, &(0x7f00000000c0)="39ed39bc492ef9a401b41f5ce789b10e677bd76cc6e624cd447fb970da07428718d77a90e30d0b370a87373c8bf15da8020b1fe74d91523022d8ce7162124fae4c7291c5a4b059447ea15f635f44916b564afe569775173c1b9c0964e05b7eced99e64a9ac5625e126e495e901f684bbc83f7f94cdd24abf3e50fe9b4676b851d997e05d7fbc1772159c6623ab6559870dc9f210d14d8ef1a40b1031a008619b3b1c1bbe44a171f79bf6d367eb62afe0dd8856355999d64fecfa92657880c6a7c2d6cb4ec91cdd28dda725398c285e4ebf5aedbe44e46f3154a95faae512", 0xde, 0x6, &(0x7f0000000000)={0x0, 0x989680})
sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"/268], 0x20}}, 0x4) (async)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x80000000, 0x5}, 0x40000, 0xfffffffffffffffc, 0xfffffffe, 0x8, 0x0, 0x2, 0x0, 0x0, 0x4000000, 0x0, 0xbce9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
mq_timedsend(r0, &(0x7f00000000c0)="39ed39bc492ef9a401b41f5ce789b10e677bd76cc6e624cd447fb970da07428718d77a90e30d0b370a87373c8bf15da8020b1fe74d91523022d8ce7162124fae4c7291c5a4b059447ea15f635f44916b564afe569775173c1b9c0964e05b7eced99e64a9ac5625e126e495e901f684bbc83f7f94cdd24abf3e50fe9b4676b851d997e05d7fbc1772159c6623ab6559870dc9f210d14d8ef1a40b1031a008619b3b1c1bbe44a171f79bf6d367eb62afe0dd8856355999d64fecfa92657880c6a7c2d6cb4ec91cdd28dda725398c285e4ebf5aedbe44e46f3154a95faae512", 0xde, 0x6, &(0x7f0000000000)={0x0, 0x989680}) (async)

12:08:59 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 22)

12:08:59 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 28)

12:08:59 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000200)={0x0, 0x7}, 0x2)
writev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)="561330e1467b4e4a3eee356d9173ee4cc530745c5faeb58477fa39bfc74ac17ae87585f53a9c29a3acfffe551ab7516968f3c3bb4e7cd69766189857da20cc0206fe6298ee6a9af3ac8cac76289a8596d41e6d368671eba7419e98225ef8cbce52cdf3068cf91777c708cdbaae", 0x6d}], 0x1)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2)
sendfile(r3, r0, &(0x7f00000001c0)=0x10001, 0xc40)
r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r4, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000180)={0x2, 0x81}, 0x2)

[  292.957214] FAULT_INJECTION: forcing a failure.
[  292.957214] name failslab, interval 1, probability 0, space 0, times 0
[  292.971392] CPU: 1 PID: 17890 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  292.979297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  292.983878] misc userio: Invalid payload size
[  292.988660] Call Trace:
[  292.988677]  dump_stack+0x1b2/0x281
[  292.988692]  should_fail.cold+0x10a/0x149
[  292.988706]  should_failslab+0xd6/0x130
[  292.988720]  kmem_cache_alloc_node_trace+0x25a/0x400
[  293.012534]  __kmalloc_node_track_caller+0x38/0x70
[  293.017456]  __alloc_skb+0x96/0x510
[  293.021070]  kobject_uevent_env+0x882/0xf30
[  293.025386]  lo_ioctl+0x11a6/0x1cd0
[  293.029001]  ? loop_set_status64+0xe0/0xe0
[  293.033235]  blkdev_ioctl+0x540/0x1830
[  293.037129]  ? blkpg_ioctl+0x8d0/0x8d0
[  293.041012]  ? trace_hardirqs_on+0x10/0x10
[  293.045247]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  293.050344]  ? debug_check_no_obj_freed+0x2c0/0x680
[  293.055529]  block_ioctl+0xd9/0x120
[  293.059170]  ? blkdev_fallocate+0x3a0/0x3a0
[  293.063493]  do_vfs_ioctl+0x75a/0xff0
[  293.067290]  ? lock_acquire+0x170/0x3f0
[  293.071249]  ? ioctl_preallocate+0x1a0/0x1a0
[  293.075663]  ? __fget+0x265/0x3e0
[  293.079106]  ? do_vfs_ioctl+0xff0/0xff0
[  293.083068]  ? security_file_ioctl+0x83/0xb0
[  293.087487]  SyS_ioctl+0x7f/0xb0
[  293.090858]  ? do_vfs_ioctl+0xff0/0xff0
[  293.094828]  do_syscall_64+0x1d5/0x640
[  293.098709]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  293.103887] RIP: 0033:0x7faf49caafc7
[  293.107667] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  293.115360] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  293.122699] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  293.129956] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  293.137208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  293.144461] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
12:08:59 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f00000000c0)={0x2, 0xff}, 0x2)
r1 = timerfd_create(0x8, 0x0)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000180)={0x0, 0x2}, 0x2)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x5, 0x5, 0x1, 0x400})
io_setup(0x3f, &(0x7f0000000140)=<r2=>0x0)
io_cancel(r2, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  293.179178] vxfs: WRONG superblock magic 00000000 at 1
[  293.184736] FAULT_INJECTION: forcing a failure.
[  293.184736] name failslab, interval 1, probability 0, space 0, times 0
[  293.199180] misc userio: Begin command sent, but we're already running
[  293.220191] misc userio: No port type given on /dev/userio
12:08:59 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x6, 0x2, 0x2, 0xf3, 0x5, [{0xfffffffffffffff7, 0x3e71, 0x5, '\x00', 0x2004}, {0x9, 0x4, 0x800, '\x00', 0x1808}, {0x1, 0x8000, 0xaf, '\x00', 0x802}, {0x7f, 0x4, 0x101, '\x00', 0x4}, {0x0, 0x4, 0x8, '\x00', 0xc80}]})
mq_open(&(0x7f0000000000)='}!\x00', 0x40, 0x80, &(0x7f00000000c0)={0x101, 0x1, 0x800})

[  293.237816] vxfs: WRONG superblock magic 00000000 at 8
[  293.243187] CPU: 1 PID: 17897 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  293.251070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  293.260428] Call Trace:
[  293.263029]  dump_stack+0x1b2/0x281
[  293.266676]  should_fail.cold+0x10a/0x149
[  293.270845]  should_failslab+0xd6/0x130
[  293.274824]  kmem_cache_alloc_node+0x263/0x410
[  293.279411]  __alloc_skb+0x5c/0x510
[  293.283074]  kobject_uevent_env+0x882/0xf30
[  293.287410]  lo_ioctl+0x11a6/0x1cd0
[  293.291037]  ? loop_set_status64+0xe0/0xe0
[  293.295262]  blkdev_ioctl+0x540/0x1830
[  293.299135]  ? native_iret+0x7/0x7
[  293.302665]  ? blkpg_ioctl+0x8d0/0x8d0
[  293.306536]  ? error_exit+0xb/0x20
[  293.310075]  ? __fget+0x23e/0x3e0
[  293.313546]  block_ioctl+0xd9/0x120
[  293.317166]  ? blkdev_fallocate+0x3a0/0x3a0
[  293.321476]  do_vfs_ioctl+0x75a/0xff0
[  293.325258]  ? lock_acquire+0x170/0x3f0
[  293.329219]  ? ioctl_preallocate+0x1a0/0x1a0
[  293.333618]  ? __fget+0x265/0x3e0
[  293.337057]  ? do_vfs_ioctl+0xff0/0xff0
[  293.341021]  ? security_file_ioctl+0x83/0xb0
[  293.345503]  SyS_ioctl+0x7f/0xb0
[  293.348851]  ? do_vfs_ioctl+0xff0/0xff0
[  293.352812]  do_syscall_64+0x1d5/0x640
[  293.356690]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  293.361864] RIP: 0033:0x7f5c30cedfc7
[  293.365556] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  293.373250] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  293.380501] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  293.387753] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  293.395010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  293.402262] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  293.419617] misc userio: The device must be registered before sending interrupts
[  293.428566] misc userio: Begin command sent, but we're already running
12:08:59 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x6, 0x2, 0x2, 0xf3, 0x5, [{0xfffffffffffffff7, 0x3e71, 0x5, '\x00', 0x2004}, {0x9, 0x4, 0x800, '\x00', 0x1808}, {0x1, 0x8000, 0xaf, '\x00', 0x802}, {0x7f, 0x4, 0x101, '\x00', 0x4}, {0x0, 0x4, 0x8, '\x00', 0xc80}]})
mq_open(&(0x7f0000000000)='}!\x00', 0x40, 0x80, &(0x7f00000000c0)={0x101, 0x1, 0x800})

12:08:59 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x6, 0x2, 0x2, 0xf3, 0x5, [{0xfffffffffffffff7, 0x3e71, 0x5, '\x00', 0x2004}, {0x9, 0x4, 0x800, '\x00', 0x1808}, {0x1, 0x8000, 0xaf, '\x00', 0x802}, {0x7f, 0x4, 0x101, '\x00', 0x4}, {0x0, 0x4, 0x8, '\x00', 0xc80}]})
mq_open(&(0x7f0000000000)='}!\x00', 0x40, 0x80, &(0x7f00000000c0)={0x101, 0x1, 0x800})
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x6, 0x2, 0x2, 0xf3, 0x5, [{0xfffffffffffffff7, 0x3e71, 0x5, '\x00', 0x2004}, {0x9, 0x4, 0x800, '\x00', 0x1808}, {0x1, 0x8000, 0xaf, '\x00', 0x802}, {0x7f, 0x4, 0x101, '\x00', 0x4}, {0x0, 0x4, 0x8, '\x00', 0xc80}]}) (async)
mq_open(&(0x7f0000000000)='}!\x00', 0x40, 0x80, &(0x7f00000000c0)={0x101, 0x1, 0x800}) (async)

[  293.438966] vxfs: can't find superblock.
[  293.449021] misc userio: Begin command sent, but we're already running
[  293.449167] misc userio: Begin command sent, but we're already running
[  293.457821] misc userio: Begin command sent, but we're already running
[  293.479756] misc userio: Begin command sent, but we're already running
12:08:59 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 29)

[  293.486801] misc userio: Begin command sent, but we're already running
[  293.500534] misc userio: Begin command sent, but we're already running
[  293.519567] misc userio: Begin command sent, but we're already running
12:08:59 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffe01, 0x6}, 0x200, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, <r1=>r0, {0x7}}, './file0\x00'})
openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x8000, 0x10e)
recvmsg$unix(r1, &(0x7f00000004c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f00000001c0)=""/108, 0x6c}, {&(0x7f0000000240)=""/209, 0xd1}, {&(0x7f0000000340)=""/22, 0x16}, {&(0x7f0000000380)=""/200, 0xc8}], 0x4}, 0x2002)
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x1f, 0x1, 0x1b, 0x8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x32}, 0x43040, 0xfffffffffffffffe, 0x10001, 0x4, 0x1e, 0x509, 0x9, 0x0, 0xffffff7f, 0x0, 0x7f}, 0x0, 0xa, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r2, 0x0)
fchown(0xffffffffffffffff, 0xee01, r2)
r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8003}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1c6}, {&(0x7f00000005c0)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000013c00))
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={<r6=>0x0}, &(0x7f0000000580)=0xc)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, r6, 0x0, r3, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r7=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(r4, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r7, 0x0)
fchown(r3, 0xee01, r7)
fsetxattr$system_posix_acl(r0, &(0x7f0000000540)='system.posix_acl_default\x00', &(0x7f0000002840)={{}, {0x1, 0x4}, [{0x2, 0x3}, {0x2, 0x5}, {0x2, 0xc}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x1}], {0x4, 0x2}, [{0x8, 0x0, r2}, {0x8, 0x2, r7}, {0x8, 0x4, 0xee01}], {0x10, 0x4}, {0x20, 0x2}}, 0x64, 0x1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  293.535702] misc userio: Begin command sent, but we're already running
[  293.548376] vxfs: WRONG superblock magic 00000000 at 1
[  293.550417] misc userio: Begin command sent, but we're already running
[  293.566083] vxfs: WRONG superblock magic 00000000 at 8
[  293.571577] misc userio: Begin command sent, but we're already running
[  293.586064] vxfs: can't find superblock.
[  293.591033] FAULT_INJECTION: forcing a failure.
[  293.591033] name failslab, interval 1, probability 0, space 0, times 0
[  293.604642] misc userio: Begin command sent, but we're already running
[  293.611304] CPU: 0 PID: 17929 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  293.611311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  293.611316] Call Trace:
[  293.611330]  dump_stack+0x1b2/0x281
[  293.611347]  should_fail.cold+0x10a/0x149
[  293.611364]  should_failslab+0xd6/0x130
[  293.611383]  kmem_cache_alloc_node_trace+0x25a/0x400
[  293.623875] misc userio: Begin command sent, but we're already running
[  293.628617]  __kmalloc_node_track_caller+0x38/0x70
[  293.628632]  __alloc_skb+0x96/0x510
[  293.628647]  kobject_uevent_env+0x882/0xf30
[  293.628667]  lo_ioctl+0x11a6/0x1cd0
[  293.631331] misc userio: Begin command sent, but we're already running
[  293.634849]  ? loop_set_status64+0xe0/0xe0
[  293.634865]  blkdev_ioctl+0x540/0x1830
[  293.634877]  ? blkpg_ioctl+0x8d0/0x8d0
[  293.634889]  ? perf_trace_lock+0xf7/0x490
[  293.634901]  ? perf_trace_lock_acquire+0x510/0x510
[  293.634917]  block_ioctl+0xd9/0x120
[  293.634926]  ? blkdev_fallocate+0x3a0/0x3a0
[  293.634936]  do_vfs_ioctl+0x75a/0xff0
[  293.634948]  ? lock_acquire+0x170/0x3f0
[  293.639527] misc userio: Begin command sent, but we're already running
[  293.643028]  ? ioctl_preallocate+0x1a0/0x1a0
[  293.643043]  ? __fget+0x265/0x3e0
[  293.643056]  ? do_vfs_ioctl+0xff0/0xff0
[  293.643069]  ? security_file_ioctl+0x83/0xb0
[  293.643080]  SyS_ioctl+0x7f/0xb0
[  293.643087]  ? do_vfs_ioctl+0xff0/0xff0
[  293.643100]  do_syscall_64+0x1d5/0x640
[  293.643115]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  293.643122] RIP: 0033:0x7faf49caafc7
[  293.643127] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  293.643140] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  293.648551] misc userio: Begin command sent, but we're already running
[  293.654861] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
12:09:00 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 23)

[  293.654867] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  293.654873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  293.654879] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  293.712117] vxfs: WRONG superblock magic 00000000 at 1
[  293.716568] misc userio: Begin command sent, but we're already running
[  293.745575] vxfs: WRONG superblock magic 00000000 at 8
[  293.748717] misc userio: Begin command sent, but we're already running
[  293.809548] vxfs: can't find superblock.
[  293.870395] FAULT_INJECTION: forcing a failure.
[  293.870395] name failslab, interval 1, probability 0, space 0, times 0
[  293.889107] CPU: 1 PID: 17946 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  293.896999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  293.906347] Call Trace:
[  293.908923]  dump_stack+0x1b2/0x281
[  293.912544]  should_fail.cold+0x10a/0x149
[  293.916680]  should_failslab+0xd6/0x130
[  293.920635]  kmem_cache_alloc_node_trace+0x25a/0x400
[  293.925722]  __kmalloc_node_track_caller+0x38/0x70
[  293.930636]  __alloc_skb+0x96/0x510
[  293.934261]  kobject_uevent_env+0x882/0xf30
[  293.938580]  lo_ioctl+0x11a6/0x1cd0
[  293.942198]  ? loop_set_status64+0xe0/0xe0
[  293.946416]  blkdev_ioctl+0x540/0x1830
[  293.950290]  ? blkpg_ioctl+0x8d0/0x8d0
[  293.954166]  ? trace_hardirqs_on+0x10/0x10
[  293.958394]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  293.963997]  ? debug_check_no_obj_freed+0x2c0/0x680
[  293.969171]  block_ioctl+0xd9/0x120
[  293.972777]  ? blkdev_fallocate+0x3a0/0x3a0
[  293.977080]  do_vfs_ioctl+0x75a/0xff0
[  293.980862]  ? lock_acquire+0x170/0x3f0
[  293.984818]  ? ioctl_preallocate+0x1a0/0x1a0
[  293.989210]  ? __fget+0x265/0x3e0
[  293.992648]  ? do_vfs_ioctl+0xff0/0xff0
[  293.996618]  ? security_file_ioctl+0x83/0xb0
[  294.001114]  SyS_ioctl+0x7f/0xb0
[  294.004469]  ? do_vfs_ioctl+0xff0/0xff0
[  294.008432]  do_syscall_64+0x1d5/0x640
[  294.012309]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  294.017477] RIP: 0033:0x7f5c30cedfc7
[  294.021164] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  294.028852] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  294.036135] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  294.043399] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  294.050687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  294.057955] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  294.070303] EXT4-fs warning (device loop5): ext4_enable_quotas:5779: Failed to enable quota tracking (type=-1, err=-22). Please run e2fsck to fix.
[  294.086337] vxfs: WRONG superblock magic 00000000 at 1
[  294.095490] vxfs: WRONG superblock magic 00000000 at 8
[  294.100936] vxfs: can't find superblock.
[  294.101533] EXT4-fs (loop5): mount failed
12:09:01 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xe7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x0, 0x6, 0xcb, 0x0, 0x8, 0x0, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_bp, 0x10e, 0xfffffffffffffffd, 0x6e, 0x6, 0x1, 0x4, 0x3, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0xb, r0, 0x4)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r2, 0x8, 0x2, 0x8001, 0x744})
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f00000000c0)={0x2, 0x40}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xe7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x0, 0x6, 0xcb, 0x0, 0x8, 0x0, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_bp, 0x10e, 0xfffffffffffffffd, 0x6e, 0x6, 0x1, 0x4, 0x3, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0xb, r0, 0x4) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2) (async)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r2, 0x8, 0x2, 0x8001, 0x744}) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2) (async)
write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f00000000c0)={0x2, 0x40}, 0x2) (async)

12:09:01 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 30)

12:09:01 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 24)

12:09:01 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000200)={0x0, 0x7}, 0x2)
writev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)="561330e1467b4e4a3eee356d9173ee4cc530745c5faeb58477fa39bfc74ac17ae87585f53a9c29a3acfffe551ab7516968f3c3bb4e7cd69766189857da20cc0206fe6298ee6a9af3ac8cac76289a8596d41e6d368671eba7419e98225ef8cbce52cdf3068cf91777c708cdbaae", 0x6d}], 0x1)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2)
sendfile(r3, r0, &(0x7f00000001c0)=0x10001, 0xc40)
r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r4, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000180)={0x2, 0x81}, 0x2)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2) (async)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000200)={0x0, 0x7}, 0x2) (async)
writev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)="561330e1467b4e4a3eee356d9173ee4cc530745c5faeb58477fa39bfc74ac17ae87585f53a9c29a3acfffe551ab7516968f3c3bb4e7cd69766189857da20cc0206fe6298ee6a9af3ac8cac76289a8596d41e6d368671eba7419e98225ef8cbce52cdf3068cf91777c708cdbaae", 0x6d}], 0x1) (async)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2) (async)
sendfile(r3, r0, &(0x7f00000001c0)=0x10001, 0xc40) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r4, &(0x7f0000000040), 0x2) (async)
write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000180)={0x2, 0x81}, 0x2) (async)

12:09:01 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffe01, 0x6}, 0x200, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, <r1=>r0, {0x7}}, './file0\x00'})
openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x8000, 0x10e) (async)
recvmsg$unix(r1, &(0x7f00000004c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f00000001c0)=""/108, 0x6c}, {&(0x7f0000000240)=""/209, 0xd1}, {&(0x7f0000000340)=""/22, 0x16}, {&(0x7f0000000380)=""/200, 0xc8}], 0x4}, 0x2002) (async, rerun: 32)
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x1f, 0x1, 0x1b, 0x8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x32}, 0x43040, 0xfffffffffffffffe, 0x10001, 0x4, 0x1e, 0x509, 0x9, 0x0, 0xffffff7f, 0x0, 0x7f}, 0x0, 0xa, 0xffffffffffffffff, 0x8) (rerun: 32)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r2, 0x0)
fchown(0xffffffffffffffff, 0xee01, r2) (async, rerun: 32)
r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32)
r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8003}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1c6}, {&(0x7f00000005c0)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000013c00))
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) (async)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={<r6=>0x0}, &(0x7f0000000580)=0xc)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, r6, 0x0, r3, 0x0) (async)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r7=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(r4, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r7, 0x0) (async, rerun: 64)
fchown(r3, 0xee01, r7) (async, rerun: 64)
fsetxattr$system_posix_acl(r0, &(0x7f0000000540)='system.posix_acl_default\x00', &(0x7f0000002840)={{}, {0x1, 0x4}, [{0x2, 0x3}, {0x2, 0x5}, {0x2, 0xc}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x1}], {0x4, 0x2}, [{0x8, 0x0, r2}, {0x8, 0x2, r7}, {0x8, 0x4, 0xee01}], {0x10, 0x4}, {0x20, 0x2}}, 0x64, 0x1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  295.415140] FAULT_INJECTION: forcing a failure.
[  295.415140] name failslab, interval 1, probability 0, space 0, times 0
[  295.430444] misc userio: No port type given on /dev/userio
[  295.440905] CPU: 0 PID: 17977 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  295.448799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  295.452349] misc userio: The device must be registered before sending interrupts
[  295.458145] Call Trace:
[  295.458162]  dump_stack+0x1b2/0x281
[  295.458177]  should_fail.cold+0x10a/0x149
[  295.458194]  should_failslab+0xd6/0x130
[  295.458207]  kmem_cache_alloc_node_trace+0x25a/0x400
[  295.458221]  __kmalloc_node_track_caller+0x38/0x70
[  295.486376] misc userio: Invalid payload size
[  295.490027]  __alloc_skb+0x96/0x510
[  295.490045]  kobject_uevent_env+0x882/0xf30
[  295.490064]  lo_ioctl+0x11a6/0x1cd0
[  295.506054]  ? loop_set_status64+0xe0/0xe0
[  295.510288]  blkdev_ioctl+0x540/0x1830
[  295.514166]  ? blkpg_ioctl+0x8d0/0x8d0
[  295.518050]  ? trace_hardirqs_on+0x10/0x10
[  295.522292]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  295.527396]  ? debug_check_no_obj_freed+0x2c0/0x680
[  295.532412]  block_ioctl+0xd9/0x120
[  295.536021]  ? blkdev_fallocate+0x3a0/0x3a0
[  295.540510]  do_vfs_ioctl+0x75a/0xff0
[  295.544315]  ? lock_acquire+0x170/0x3f0
[  295.548282]  ? ioctl_preallocate+0x1a0/0x1a0
[  295.552702]  ? __fget+0x265/0x3e0
[  295.556152]  ? do_vfs_ioctl+0xff0/0xff0
[  295.560213]  ? security_file_ioctl+0x83/0xb0
[  295.564734]  SyS_ioctl+0x7f/0xb0
[  295.568102]  ? do_vfs_ioctl+0xff0/0xff0
[  295.572077]  do_syscall_64+0x1d5/0x640
[  295.575958]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  295.581131] RIP: 0033:0x7faf49caafc7
[  295.584865] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  295.592629] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  295.599878] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  295.607137] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
12:09:02 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) (async)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f00000000c0)={0x2, 0xff}, 0x2) (async)
r1 = timerfd_create(0x8, 0x0)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000180)={0x0, 0x2}, 0x2)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x5, 0x5, 0x1, 0x400}) (async)
io_setup(0x3f, &(0x7f0000000140)=<r2=>0x0)
io_cancel(r2, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  295.614518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  295.621766] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  295.641393] FAULT_INJECTION: forcing a failure.
[  295.641393] name failslab, interval 1, probability 0, space 0, times 0
[  295.665546] vxfs: WRONG superblock magic 00000000 at 1
[  295.671040] CPU: 0 PID: 17981 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  295.675289] misc userio: Begin command sent, but we're already running
[  295.678916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  295.678922] Call Trace:
[  295.678938]  dump_stack+0x1b2/0x281
[  295.678955]  should_fail.cold+0x10a/0x149
[  295.678970]  should_failslab+0xd6/0x130
[  295.678983]  kmem_cache_alloc_node+0x263/0x410
[  295.678997]  __alloc_skb+0x5c/0x510
[  295.686278] vxfs: WRONG superblock magic 00000000 at 8
[  295.695010]  kobject_uevent_env+0x882/0xf30
[  295.695033]  lo_ioctl+0x11a6/0x1cd0
[  295.695049]  ? loop_set_status64+0xe0/0xe0
[  295.695063]  blkdev_ioctl+0x540/0x1830
[  295.695075]  ? blkpg_ioctl+0x8d0/0x8d0
[  295.695088]  ? perf_trace_lock+0xf7/0x490
[  295.695100]  ? perf_trace_lock_acquire+0x510/0x510
[  295.695114]  block_ioctl+0xd9/0x120
[  295.695122]  ? blkdev_fallocate+0x3a0/0x3a0
[  295.695133]  do_vfs_ioctl+0x75a/0xff0
[  295.695142]  ? lock_acquire+0x170/0x3f0
[  295.695152]  ? ioctl_preallocate+0x1a0/0x1a0
[  295.706022] vxfs: can't find superblock.
[  295.709434]  ? __fget+0x265/0x3e0
[  295.709449]  ? do_vfs_ioctl+0xff0/0xff0
[  295.709462]  ? security_file_ioctl+0x83/0xb0
[  295.709474]  SyS_ioctl+0x7f/0xb0
[  295.709483]  ? do_vfs_ioctl+0xff0/0xff0
[  295.709497]  do_syscall_64+0x1d5/0x640
[  295.798931]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  295.804123] RIP: 0033:0x7f5c30cedfc7
[  295.807821] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  295.815594] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  295.822845] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  295.830091] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  295.837340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  295.844587] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  295.855571] vxfs: WRONG superblock magic 00000000 at 1
12:09:02 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 25)

12:09:02 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 31)

[  295.879796] vxfs: WRONG superblock magic 00000000 at 8
[  295.889834] vxfs: can't find superblock.
[  295.902695] EXT4-fs warning (device loop5): ext4_enable_quotas:5779: Failed to enable quota tracking (type=-1, err=-22). Please run e2fsck to fix.
[  295.968045] FAULT_INJECTION: forcing a failure.
[  295.968045] name failslab, interval 1, probability 0, space 0, times 0
[  295.983573] CPU: 0 PID: 18039 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  295.984740] EXT4-fs (loop5): mount failed
[  295.991469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  295.991474] Call Trace:
[  295.991491]  dump_stack+0x1b2/0x281
[  295.991508]  should_fail.cold+0x10a/0x149
[  295.991524]  should_failslab+0xd6/0x130
[  295.991539]  kmem_cache_alloc_node+0x263/0x410
[  295.991553]  __alloc_skb+0x5c/0x510
[  296.027592]  kobject_uevent_env+0x882/0xf30
[  296.031901]  lo_ioctl+0x11a6/0x1cd0
[  296.035516]  ? loop_set_status64+0xe0/0xe0
[  296.039739]  blkdev_ioctl+0x540/0x1830
[  296.043616]  ? blkpg_ioctl+0x8d0/0x8d0
[  296.047485]  ? perf_trace_lock+0xf7/0x490
[  296.051615]  ? perf_trace_lock_acquire+0x510/0x510
[  296.056533]  block_ioctl+0xd9/0x120
[  296.060186]  ? blkdev_fallocate+0x3a0/0x3a0
[  296.064499]  do_vfs_ioctl+0x75a/0xff0
[  296.068288]  ? lock_acquire+0x170/0x3f0
[  296.072250]  ? ioctl_preallocate+0x1a0/0x1a0
[  296.076658]  ? __fget+0x265/0x3e0
[  296.080112]  ? do_vfs_ioctl+0xff0/0xff0
[  296.084080]  ? security_file_ioctl+0x83/0xb0
[  296.088468]  SyS_ioctl+0x7f/0xb0
[  296.091817]  ? do_vfs_ioctl+0xff0/0xff0
[  296.095770]  do_syscall_64+0x1d5/0x640
[  296.099641]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  296.104807] RIP: 0033:0x7f5c30cedfc7
[  296.108494] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  296.116181] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  296.123430] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  296.130681] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  296.137929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  296.145181] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  296.162520] FAULT_INJECTION: forcing a failure.
[  296.162520] name failslab, interval 1, probability 0, space 0, times 0
[  296.176400] CPU: 0 PID: 18042 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  296.182099] vxfs: WRONG superblock magic 00000000 at 1
[  296.184292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  296.184298] Call Trace:
[  296.184314]  dump_stack+0x1b2/0x281
[  296.184331]  should_fail.cold+0x10a/0x149
[  296.184348]  should_failslab+0xd6/0x130
[  296.184363]  kmem_cache_alloc_node+0x263/0x410
[  296.184379]  __alloc_skb+0x5c/0x510
[  296.184397]  kobject_uevent_env+0x882/0xf30
[  296.193018] vxfs: WRONG superblock magic 00000000 at 8
[  296.199025]  lo_ioctl+0x11a6/0x1cd0
[  296.199042]  ? loop_set_status64+0xe0/0xe0
[  296.199056]  blkdev_ioctl+0x540/0x1830
[  296.199068]  ? blkpg_ioctl+0x8d0/0x8d0
[  296.199080]  ? perf_trace_lock+0xf7/0x490
[  296.199093]  ? perf_trace_lock_acquire+0x510/0x510
[  296.208187] vxfs: can't find superblock.
[  296.209402]  block_ioctl+0xd9/0x120
[  296.209413]  ? blkdev_fallocate+0x3a0/0x3a0
[  296.209425]  do_vfs_ioctl+0x75a/0xff0
[  296.209438]  ? lock_acquire+0x170/0x3f0
[  296.209449]  ? ioctl_preallocate+0x1a0/0x1a0
[  296.209463]  ? __fget+0x265/0x3e0
[  296.209475]  ? do_vfs_ioctl+0xff0/0xff0
[  296.287206]  ? security_file_ioctl+0x83/0xb0
[  296.291616]  SyS_ioctl+0x7f/0xb0
[  296.294975]  ? do_vfs_ioctl+0xff0/0xff0
[  296.298939]  do_syscall_64+0x1d5/0x640
[  296.302813]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  296.307996] RIP: 0033:0x7faf49caafc7
[  296.311860] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
12:09:02 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffe01, 0x6}, 0x200, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, <r1=>r0, {0x7}}, './file0\x00'})
openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x8000, 0x10e)
recvmsg$unix(r1, &(0x7f00000004c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f00000001c0)=""/108, 0x6c}, {&(0x7f0000000240)=""/209, 0xd1}, {&(0x7f0000000340)=""/22, 0x16}, {&(0x7f0000000380)=""/200, 0xc8}], 0x4}, 0x2002)
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x1f, 0x1, 0x1b, 0x8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x32}, 0x43040, 0xfffffffffffffffe, 0x10001, 0x4, 0x1e, 0x509, 0x9, 0x0, 0xffffff7f, 0x0, 0x7f}, 0x0, 0xa, 0xffffffffffffffff, 0x8) (async)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r2, 0x0) (async)
fchown(0xffffffffffffffff, 0xee01, r2)
r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8003}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1c6}, {&(0x7f00000005c0)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000013c00)) (async, rerun: 32)
r5 = socket(0x10, 0x2, 0x0) (rerun: 32)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) (async)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={<r6=>0x0}, &(0x7f0000000580)=0xc)
perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x73, 0x4, 0x0, 0x0, 0x588, 0x20009, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x2a9, 0xffffffffffffff0c}, 0x80, 0x1, 0x1f, 0x3, 0xbaee, 0x80, 0x80a, 0x0, 0x0, 0x0, 0x1}, r6, 0x0, r3, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r7=>0x0}, &(0x7f0000cab000)=0xc)
fchownat(r4, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r7, 0x0) (async)
fchown(r3, 0xee01, r7)
fsetxattr$system_posix_acl(r0, &(0x7f0000000540)='system.posix_acl_default\x00', &(0x7f0000002840)={{}, {0x1, 0x4}, [{0x2, 0x3}, {0x2, 0x5}, {0x2, 0xc}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x1}], {0x4, 0x2}, [{0x8, 0x0, r2}, {0x8, 0x2, r7}, {0x8, 0x4, 0xee01}], {0x10, 0x4}, {0x20, 0x2}}, 0x64, 0x1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  296.319552] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  296.326801] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  296.334053] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  296.341303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  296.348553] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  296.359139] vxfs: WRONG superblock magic 00000000 at 1
12:09:02 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 26)

[  296.393911] vxfs: WRONG superblock magic 00000000 at 8
[  296.399208] vxfs: can't find superblock.
[  296.433940] FAULT_INJECTION: forcing a failure.
12:09:02 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 32)

[  296.433940] name failslab, interval 1, probability 0, space 0, times 0
[  296.447812] CPU: 0 PID: 18057 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  296.455723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  296.465151] Call Trace:
[  296.467721]  dump_stack+0x1b2/0x281
[  296.471329]  should_fail.cold+0x10a/0x149
[  296.475475]  should_failslab+0xd6/0x130
[  296.479535]  kmem_cache_alloc_node_trace+0x25a/0x400
[  296.484623]  __kmalloc_node_track_caller+0x38/0x70
[  296.489536]  __alloc_skb+0x96/0x510
[  296.493181]  kobject_uevent_env+0x882/0xf30
[  296.497502]  lo_ioctl+0x11a6/0x1cd0
[  296.501120]  ? loop_set_status64+0xe0/0xe0
[  296.505337]  blkdev_ioctl+0x540/0x1830
[  296.509206]  ? blkpg_ioctl+0x8d0/0x8d0
[  296.513075]  ? perf_trace_lock+0xf7/0x490
[  296.517217]  ? perf_trace_lock_acquire+0x510/0x510
[  296.522130]  block_ioctl+0xd9/0x120
[  296.525734]  ? blkdev_fallocate+0x3a0/0x3a0
[  296.530034]  do_vfs_ioctl+0x75a/0xff0
[  296.533820]  ? lock_acquire+0x170/0x3f0
[  296.537785]  ? ioctl_preallocate+0x1a0/0x1a0
[  296.542175]  ? __fget+0x265/0x3e0
[  296.545614]  ? do_vfs_ioctl+0xff0/0xff0
[  296.549575]  ? security_file_ioctl+0x83/0xb0
[  296.553975]  SyS_ioctl+0x7f/0xb0
[  296.557333]  ? do_vfs_ioctl+0xff0/0xff0
[  296.561297]  do_syscall_64+0x1d5/0x640
[  296.565169]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  296.570336] RIP: 0033:0x7f5c30cedfc7
[  296.574039] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  296.581729] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  296.588980] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  296.596232] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  296.603489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  296.610741] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  296.641235] FAULT_INJECTION: forcing a failure.
[  296.641235] name failslab, interval 1, probability 0, space 0, times 0
[  296.641594] vxfs: WRONG superblock magic 00000000 at 1
[  296.654397] CPU: 1 PID: 18062 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  296.664823] vxfs: WRONG superblock magic 00000000 at 8
[  296.665791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  296.665796] Call Trace:
[  296.665811]  dump_stack+0x1b2/0x281
[  296.665827]  should_fail.cold+0x10a/0x149
[  296.665841]  should_failslab+0xd6/0x130
[  296.671207] vxfs: can't find superblock.
[  296.680433]  kmem_cache_alloc_node+0x263/0x410
[  296.680447]  __alloc_skb+0x5c/0x510
[  296.680461]  kobject_uevent_env+0x882/0xf30
[  296.680481]  lo_ioctl+0x11a6/0x1cd0
[  296.680497]  ? loop_set_status64+0xe0/0xe0
[  296.680511]  blkdev_ioctl+0x540/0x1830
[  296.680522]  ? blkpg_ioctl+0x8d0/0x8d0
[  296.680533]  ? perf_trace_lock+0xf7/0x490
[  296.680547]  ? perf_trace_lock_acquire+0x510/0x510
[  296.680563]  block_ioctl+0xd9/0x120
[  296.680570]  ? blkdev_fallocate+0x3a0/0x3a0
[  296.680580]  do_vfs_ioctl+0x75a/0xff0
[  296.680590]  ? lock_acquire+0x170/0x3f0
[  296.680599]  ? ioctl_preallocate+0x1a0/0x1a0
[  296.680611]  ? __fget+0x265/0x3e0
[  296.680622]  ? do_vfs_ioctl+0xff0/0xff0
[  296.680635]  ? security_file_ioctl+0x83/0xb0
[  296.680647]  SyS_ioctl+0x7f/0xb0
[  296.680654]  ? do_vfs_ioctl+0xff0/0xff0
[  296.680665]  do_syscall_64+0x1d5/0x640
[  296.680681]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  296.680689] RIP: 0033:0x7faf49caafc7
[  296.680695] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  296.680704] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  296.680712] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  296.810137] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  296.817403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  296.824657] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
12:09:03 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 27)

[  296.861281] vxfs: WRONG superblock magic 00000000 at 1
[  296.870321] vxfs: WRONG superblock magic 00000000 at 8
[  296.876850] vxfs: can't find superblock.
[  296.921098] FAULT_INJECTION: forcing a failure.
[  296.921098] name failslab, interval 1, probability 0, space 0, times 0
[  296.932901] CPU: 1 PID: 18081 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  296.940783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  296.950135] Call Trace:
[  296.952723]  dump_stack+0x1b2/0x281
[  296.956357]  should_fail.cold+0x10a/0x149
[  296.960509]  should_failslab+0xd6/0x130
[  296.962700] EXT4-fs warning (device loop5): ext4_enable_quotas:5779: Failed to enable quota tracking (type=-1, err=-22). Please run e2fsck to fix.
[  296.964489]  kmem_cache_alloc_node_trace+0x25a/0x400
[  296.964506]  __kmalloc_node_track_caller+0x38/0x70
[  296.987762]  __alloc_skb+0x96/0x510
[  296.989041] EXT4-fs (loop5): mount failed
[  296.991385]  kobject_uevent_env+0x882/0xf30
[  296.991405]  lo_ioctl+0x11a6/0x1cd0
[  297.003465]  ? loop_set_status64+0xe0/0xe0
[  297.007700]  blkdev_ioctl+0x540/0x1830
[  297.011570]  ? blkpg_ioctl+0x8d0/0x8d0
[  297.015448]  ? perf_trace_lock+0xf7/0x490
[  297.019586]  ? perf_trace_lock_acquire+0x510/0x510
[  297.024500]  block_ioctl+0xd9/0x120
[  297.028105]  ? blkdev_fallocate+0x3a0/0x3a0
[  297.032423]  do_vfs_ioctl+0x75a/0xff0
[  297.036226]  ? lock_acquire+0x170/0x3f0
[  297.040180]  ? ioctl_preallocate+0x1a0/0x1a0
[  297.044576]  ? __fget+0x265/0x3e0
[  297.048029]  ? do_vfs_ioctl+0xff0/0xff0
[  297.051987]  ? security_file_ioctl+0x83/0xb0
[  297.056379]  SyS_ioctl+0x7f/0xb0
[  297.059749]  ? do_vfs_ioctl+0xff0/0xff0
[  297.063711]  do_syscall_64+0x1d5/0x640
[  297.067596]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  297.072779] RIP: 0033:0x7f5c30cedfc7
[  297.076475] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  297.084166] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  297.091425] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  297.098682] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  297.105937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  297.113190] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  297.126129] vxfs: WRONG superblock magic 00000000 at 1
[  297.131847] vxfs: WRONG superblock magic 00000000 at 8
[  297.137581] vxfs: can't find superblock.
[  297.217233] EXT4-fs warning (device loop5): ext4_enable_quotas:5779: Failed to enable quota tracking (type=-1, err=-22). Please run e2fsck to fix.
[  297.235662] EXT4-fs (loop5): mount failed
12:09:04 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f00000001c0)=""/74, 0x4a}, {&(0x7f0000000240)=""/187, 0xbb}, {&(0x7f00000000c0)=""/16, 0x10}, {&(0x7f0000000300)=""/3, 0x3}, {&(0x7f00000003c0)=""/241, 0xf1}], 0x6)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2)
syncfs(r1)

12:09:04 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 33)

12:09:04 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 28)

12:09:04 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:09:04 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000200)={0x0, 0x7}, 0x2)
writev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)="561330e1467b4e4a3eee356d9173ee4cc530745c5faeb58477fa39bfc74ac17ae87585f53a9c29a3acfffe551ab7516968f3c3bb4e7cd69766189857da20cc0206fe6298ee6a9af3ac8cac76289a8596d41e6d368671eba7419e98225ef8cbce52cdf3068cf91777c708cdbaae", 0x6d}], 0x1)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2)
sendfile(r3, r0, &(0x7f00000001c0)=0x10001, 0xc40)
r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r4, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000180)={0x2, 0x81}, 0x2)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040), 0x2) (async)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000200)={0x0, 0x7}, 0x2) (async)
writev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)="561330e1467b4e4a3eee356d9173ee4cc530745c5faeb58477fa39bfc74ac17ae87585f53a9c29a3acfffe551ab7516968f3c3bb4e7cd69766189857da20cc0206fe6298ee6a9af3ac8cac76289a8596d41e6d368671eba7419e98225ef8cbce52cdf3068cf91777c708cdbaae", 0x6d}], 0x1) (async)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r3, &(0x7f0000000040), 0x2) (async)
sendfile(r3, r0, &(0x7f00000001c0)=0x10001, 0xc40) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r4, &(0x7f0000000040), 0x2) (async)
write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000180)={0x2, 0x81}, 0x2) (async)

[  298.211429] FAULT_INJECTION: forcing a failure.
[  298.211429] name failslab, interval 1, probability 0, space 0, times 0
[  298.223242] misc userio: Invalid payload size
[  298.227738] CPU: 1 PID: 18119 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  298.227745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  298.227748] Call Trace:
[  298.227763]  dump_stack+0x1b2/0x281
[  298.227781]  should_fail.cold+0x10a/0x149
[  298.255304]  should_failslab+0xd6/0x130
[  298.259284]  kmem_cache_alloc_node+0x263/0x410
[  298.263862]  __alloc_skb+0x5c/0x510
[  298.267510]  kobject_uevent_env+0x882/0xf30
[  298.271815]  lo_ioctl+0x11a6/0x1cd0
[  298.275421]  ? loop_set_status64+0xe0/0xe0
[  298.279637]  blkdev_ioctl+0x540/0x1830
[  298.283507]  ? blkpg_ioctl+0x8d0/0x8d0
[  298.287371]  ? trace_hardirqs_on+0x10/0x10
[  298.291586]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  298.296668]  ? debug_check_no_obj_freed+0x2c0/0x680
[  298.301680]  block_ioctl+0xd9/0x120
[  298.305303]  ? blkdev_fallocate+0x3a0/0x3a0
[  298.309617]  do_vfs_ioctl+0x75a/0xff0
[  298.313403]  ? lock_acquire+0x170/0x3f0
[  298.317396]  ? ioctl_preallocate+0x1a0/0x1a0
[  298.321791]  ? __fget+0x265/0x3e0
[  298.325226]  ? do_vfs_ioctl+0xff0/0xff0
[  298.329182]  ? security_file_ioctl+0x83/0xb0
[  298.333570]  SyS_ioctl+0x7f/0xb0
[  298.336911]  ? do_vfs_ioctl+0xff0/0xff0
[  298.340866]  do_syscall_64+0x1d5/0x640
[  298.344749]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  298.349919] RIP: 0033:0x7faf49caafc7
[  298.353606] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  298.361297] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  298.368550] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  298.375810] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  298.383056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  298.390308] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  298.406537] FAULT_INJECTION: forcing a failure.
12:09:04 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (rerun: 64)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f00000000c0)={0x2, 0xff}, 0x2) (async)
r1 = timerfd_create(0x8, 0x0)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000180)={0x0, 0x2}, 0x2) (async)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x5, 0x5, 0x1, 0x400})
io_setup(0x3f, &(0x7f0000000140)=<r2=>0x0)
io_cancel(r2, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:04 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:09:04 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (rerun: 32)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async, rerun: 32)
readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f00000001c0)=""/74, 0x4a}, {&(0x7f0000000240)=""/187, 0xbb}, {&(0x7f00000000c0)=""/16, 0x10}, {&(0x7f0000000300)=""/3, 0x3}, {&(0x7f00000003c0)=""/241, 0xf1}], 0x6) (async, rerun: 32)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2)
syncfs(r1)

12:09:04 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  298.406537] name failslab, interval 1, probability 0, space 0, times 0
[  298.408749] vxfs: WRONG superblock magic 00000000 at 1
[  298.442774] vxfs: WRONG superblock magic 00000000 at 8
[  298.455908] vxfs: can't find superblock.
[  298.464830] CPU: 0 PID: 18117 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  298.472717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  298.482063] Call Trace:
[  298.484639]  dump_stack+0x1b2/0x281
[  298.488254]  should_fail.cold+0x10a/0x149
[  298.492390]  should_failslab+0xd6/0x130
[  298.496373]  kmem_cache_alloc_node_trace+0x25a/0x400
[  298.501465]  __kmalloc_node_track_caller+0x38/0x70
[  298.506380]  __alloc_skb+0x96/0x510
[  298.509993]  kobject_uevent_env+0x882/0xf30
[  298.514316]  lo_ioctl+0x11a6/0x1cd0
[  298.517933]  ? loop_set_status64+0xe0/0xe0
[  298.522154]  blkdev_ioctl+0x540/0x1830
[  298.526026]  ? blkpg_ioctl+0x8d0/0x8d0
[  298.529895]  ? trace_hardirqs_on+0x10/0x10
[  298.534116]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  298.539202]  ? debug_check_no_obj_freed+0x2c0/0x680
[  298.544206]  block_ioctl+0xd9/0x120
[  298.547818]  ? blkdev_fallocate+0x3a0/0x3a0
[  298.552127]  do_vfs_ioctl+0x75a/0xff0
[  298.555911]  ? lock_acquire+0x170/0x3f0
[  298.559867]  ? ioctl_preallocate+0x1a0/0x1a0
[  298.564275]  ? __fget+0x265/0x3e0
[  298.567715]  ? do_vfs_ioctl+0xff0/0xff0
[  298.571676]  ? security_file_ioctl+0x83/0xb0
[  298.576080]  SyS_ioctl+0x7f/0xb0
[  298.579429]  ? do_vfs_ioctl+0xff0/0xff0
[  298.583389]  do_syscall_64+0x1d5/0x640
[  298.587264]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  298.592436] RIP: 0033:0x7f5c30cedfc7
[  298.596126] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  298.603818] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
12:09:05 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0xb04, 0x0, 0x10000000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x81, 0x1, 0x8b, 0x1, 0x0, 0x2, 0x2290, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x74a5, 0x401}, 0x1020, 0x10000, 0x1000, 0xa, 0x400, 0x947, 0x1, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x0, r0, 0x1)
close(r1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0)

12:09:05 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f00000001c0)=""/74, 0x4a}, {&(0x7f0000000240)=""/187, 0xbb}, {&(0x7f00000000c0)=""/16, 0x10}, {&(0x7f0000000300)=""/3, 0x3}, {&(0x7f00000003c0)=""/241, 0xf1}], 0x6)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2)
syncfs(r1)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f00000001c0)=""/74, 0x4a}, {&(0x7f0000000240)=""/187, 0xbb}, {&(0x7f00000000c0)=""/16, 0x10}, {&(0x7f0000000300)=""/3, 0x3}, {&(0x7f00000003c0)=""/241, 0xf1}], 0x6) (async)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2) (async)
syncfs(r1) (async)

[  298.611257] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  298.618511] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  298.625763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  298.633016] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:09:05 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xdd45c82563bcef55, 0x0, 0xfff, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4000000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:05 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 34)

[  298.675648] misc userio: No port type given on /dev/userio
[  298.692783] vxfs: WRONG superblock magic 00000000 at 1
[  298.698721] vxfs: WRONG superblock magic 00000000 at 8
[  298.710552] vxfs: can't find superblock.
12:09:05 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xdd45c82563bcef55, 0x0, 0xfff, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4000000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  298.732401] misc userio: The device must be registered before sending interrupts
[  298.752176] FAULT_INJECTION: forcing a failure.
[  298.752176] name failslab, interval 1, probability 0, space 0, times 0
[  298.768553] CPU: 1 PID: 18174 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  298.776449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  298.785797] Call Trace:
[  298.788387]  dump_stack+0x1b2/0x281
[  298.792017]  should_fail.cold+0x10a/0x149
[  298.796172]  should_failslab+0xd6/0x130
[  298.800152]  kmem_cache_alloc_trace+0x29a/0x3d0
[  298.804910]  ? kobj_ns_drop+0x80/0x80
[  298.808712]  call_usermodehelper_setup+0x73/0x2e0
[  298.813556]  kobject_uevent_env+0xc21/0xf30
[  298.817882]  lo_ioctl+0x11a6/0x1cd0
[  298.821516]  ? loop_set_status64+0xe0/0xe0
[  298.825755]  blkdev_ioctl+0x540/0x1830
[  298.829648]  ? blkpg_ioctl+0x8d0/0x8d0
[  298.833532]  ? trace_hardirqs_on+0x10/0x10
[  298.837772]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  298.842872]  ? debug_check_no_obj_freed+0x2c0/0x680
[  298.847890]  block_ioctl+0xd9/0x120
[  298.851516]  ? blkdev_fallocate+0x3a0/0x3a0
[  298.855835]  do_vfs_ioctl+0x75a/0xff0
[  298.859721]  ? lock_acquire+0x170/0x3f0
[  298.863690]  ? ioctl_preallocate+0x1a0/0x1a0
[  298.868128]  ? __fget+0x265/0x3e0
[  298.871563]  ? do_vfs_ioctl+0xff0/0xff0
[  298.875523]  ? security_file_ioctl+0x83/0xb0
[  298.879912]  SyS_ioctl+0x7f/0xb0
[  298.883276]  ? do_vfs_ioctl+0xff0/0xff0
[  298.887233]  do_syscall_64+0x1d5/0x640
[  298.891102]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  298.896274] RIP: 0033:0x7faf49caafc7
[  298.899968] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  298.907652] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  298.914915] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  298.922335] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
12:09:05 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 29)

12:09:05 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xdd45c82563bcef55, 0x0, 0xfff, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4000000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  298.929591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  298.936841] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
[  298.960864] vxfs: WRONG superblock magic 00000000 at 1
[  298.967978] vxfs: WRONG superblock magic 00000000 at 8
[  298.991159] vxfs: can't find superblock.
[  299.008182] FAULT_INJECTION: forcing a failure.
[  299.008182] name failslab, interval 1, probability 0, space 0, times 0
[  299.019622] CPU: 1 PID: 18190 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  299.027497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  299.036835] Call Trace:
[  299.039425]  dump_stack+0x1b2/0x281
[  299.043034]  should_fail.cold+0x10a/0x149
[  299.047167]  should_failslab+0xd6/0x130
[  299.051128]  kmem_cache_alloc_node+0x263/0x410
[  299.055713]  __alloc_skb+0x5c/0x510
[  299.059327]  kobject_uevent_env+0x882/0xf30
[  299.063633]  lo_ioctl+0x11a6/0x1cd0
[  299.067248]  ? loop_set_status64+0xe0/0xe0
[  299.071595]  blkdev_ioctl+0x540/0x1830
[  299.075484]  ? blkpg_ioctl+0x8d0/0x8d0
[  299.079354]  ? trace_hardirqs_on+0x10/0x10
[  299.083579]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  299.088669]  ? debug_check_no_obj_freed+0x2c0/0x680
[  299.093666]  block_ioctl+0xd9/0x120
[  299.097271]  ? blkdev_fallocate+0x3a0/0x3a0
[  299.101568]  do_vfs_ioctl+0x75a/0xff0
[  299.105350]  ? lock_acquire+0x170/0x3f0
[  299.109298]  ? ioctl_preallocate+0x1a0/0x1a0
[  299.113687]  ? __fget+0x265/0x3e0
[  299.117120]  ? do_vfs_ioctl+0xff0/0xff0
[  299.121074]  ? security_file_ioctl+0x83/0xb0
[  299.125473]  SyS_ioctl+0x7f/0xb0
[  299.128815]  ? do_vfs_ioctl+0xff0/0xff0
[  299.132765]  do_syscall_64+0x1d5/0x640
[  299.136647]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  299.141823] RIP: 0033:0x7f5c30cedfc7
[  299.145513] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  299.153205] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  299.160646] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  299.167891] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  299.175149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  299.182415] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  299.194228] vxfs: WRONG superblock magic 00000000 at 1
[  299.204356] vxfs: WRONG superblock magic 00000000 at 8
[  299.209902] vxfs: can't find superblock.
12:09:07 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:09:07 executing program 0:
syncfs(0xffffffffffffffff)
ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000180))
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0xf48c, 0x1f, {<r0=>0xffffffffffffffff}, {}, 0x6, 0x3})
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x5, 0x92, 0x80, 0x9, 0x0, 0x0, 0x80004, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0xfffffffffffffffd, 0xe3}, 0x18104, 0x20, 0x2, 0x3, 0x2, 0x1dda, 0xff, 0x0, 0x3f, 0x0, 0x35}, r0, 0x6, 0xffffffffffffffff, 0x9)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:07 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x20000000000c4406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:07 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 35)

12:09:07 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 30)

12:09:07 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0xb04, 0x0, 0x10000000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0) (async)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x81, 0x1, 0x8b, 0x1, 0x0, 0x2, 0x2290, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x74a5, 0x401}, 0x1020, 0x10000, 0x1000, 0xa, 0x400, 0x947, 0x1, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x0, r0, 0x1) (async)
close(r1) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0)

12:09:07 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00') (async)
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)

12:09:07 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x20000000000c4406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  300.753529] FAULT_INJECTION: forcing a failure.
[  300.753529] name failslab, interval 1, probability 0, space 0, times 0
[  300.765637] CPU: 1 PID: 18232 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  300.773526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  300.782873] Call Trace:
[  300.785452]  dump_stack+0x1b2/0x281
[  300.789094]  should_fail.cold+0x10a/0x149
[  300.793256]  should_failslab+0xd6/0x130
[  300.797220]  kmem_cache_alloc_node+0x263/0x410
[  300.801796]  __alloc_skb+0x5c/0x510
[  300.805416]  kobject_uevent_env+0x882/0xf30
[  300.809737]  lo_ioctl+0x11a6/0x1cd0
[  300.813353]  ? loop_set_status64+0xe0/0xe0
[  300.817575]  blkdev_ioctl+0x540/0x1830
[  300.821444]  ? blkpg_ioctl+0x8d0/0x8d0
[  300.825319]  ? trace_hardirqs_on+0x10/0x10
[  300.829541]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  300.834626]  ? debug_check_no_obj_freed+0x2c0/0x680
[  300.839631]  block_ioctl+0xd9/0x120
[  300.843248]  ? blkdev_fallocate+0x3a0/0x3a0
[  300.847556]  do_vfs_ioctl+0x75a/0xff0
[  300.851341]  ? lock_acquire+0x170/0x3f0
[  300.855299]  ? ioctl_preallocate+0x1a0/0x1a0
[  300.859697]  ? __fget+0x265/0x3e0
[  300.863139]  ? do_vfs_ioctl+0xff0/0xff0
[  300.867112]  ? security_file_ioctl+0x83/0xb0
[  300.871508]  SyS_ioctl+0x7f/0xb0
[  300.874854]  ? do_vfs_ioctl+0xff0/0xff0
[  300.878814]  do_syscall_64+0x1d5/0x640
[  300.882703]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  300.887874] RIP: 0033:0x7f5c30cedfc7
[  300.891568] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  300.899262] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  300.906523] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  300.913794] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  300.921056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  300.928319] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  300.943987] vxfs: WRONG superblock magic 00000000 at 1
[  300.950088] FAULT_INJECTION: forcing a failure.
[  300.950088] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  300.961887] CPU: 1 PID: 18239 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  300.969765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  300.979209] Call Trace:
[  300.981799]  dump_stack+0x1b2/0x281
[  300.985434]  should_fail.cold+0x10a/0x149
[  300.989587]  __alloc_pages_nodemask+0x22c/0x2720
[  300.994342]  ? kobject_uevent_env+0x274/0xf30
[  300.998856]  ? __lock_acquire+0x5fc/0x3f20
[  301.003106]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  301.007969]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  301.012806]  ? error_exit+0xb/0x20
[  301.016332]  ? fs_reclaim_release+0xd0/0x110
[  301.020742]  cache_grow_begin+0x91/0x700
[  301.024786]  ? fs_reclaim_release+0xd0/0x110
[  301.029181]  ? check_preemption_disabled+0x35/0x240
[  301.034185]  cache_alloc_refill+0x273/0x350
[  301.038498]  kmem_cache_alloc+0x333/0x3c0
[  301.042643]  getname_flags+0xc8/0x550
[  301.046436]  SyS_mkdirat+0x83/0x270
[  301.050050]  ? SyS_mknod+0x30/0x30
[  301.053573]  ? fput_many+0xe/0x140
[  301.057095]  ? do_syscall_64+0x4c/0x640
[  301.061051]  ? SyS_mknod+0x30/0x30
[  301.064578]  do_syscall_64+0x1d5/0x640
[  301.068488]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  301.073665] RIP: 0033:0x7faf49caa317
[  301.077367] RSP: 002b:00007faf4861ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  301.085074] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49caa317
[  301.092435] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
12:09:07 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

[  301.099700] RBP: 00007faf486201d0 R08: 0000000000000000 R09: 00007faf486201d0
[  301.106961] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  301.114224] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  301.127243] vxfs: WRONG superblock magic 00000000 at 1
[  301.132847] vxfs: WRONG superblock magic 00000000 at 8
[  301.138128] vxfs: can't find superblock.
12:09:07 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000)={0x2, 0xbd}, 0x2)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:09:07 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x20000000000c4406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x20000000000c4406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

12:09:07 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 36)

12:09:07 executing program 0:
syncfs(0xffffffffffffffff) (async)
ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000180))
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0xf48c, 0x1f, {<r0=>0xffffffffffffffff}, {}, 0x6, 0x3})
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x5, 0x92, 0x80, 0x9, 0x0, 0x0, 0x80004, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0xfffffffffffffffd, 0xe3}, 0x18104, 0x20, 0x2, 0x3, 0x2, 0x1dda, 0xff, 0x0, 0x3f, 0x0, 0x35}, r0, 0x6, 0xffffffffffffffff, 0x9) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  301.159885] vxfs: WRONG superblock magic 00000000 at 8
[  301.175899] vxfs: can't find superblock.
12:09:07 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 31)

12:09:07 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01f607000000610300000096", @ANYRES32=<r2=>0xffffffffffffffff, @ANYBLOB="fdffffff000000002e2f66696c653000"])
perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x4, 0x4, 0x2, 0x0, 0x0, 0x7, 0x200, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x1, 0x1}, 0x33, 0x80000000, 0x401, 0x0, 0x100000001, 0x7, 0x3f, 0x0, 0xffffffc1, 0x0, 0x8}, 0xffffffffffffffff, 0x10, r2, 0x0)
r3 = gettid()
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r3, 0xa, r4, 0xb)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000180))
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180))
syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f0000000300)="ba210066edf36f2ff20f1bdf0f01c8ddd20f20d86635200000000f22d8b800008ec80f013f26656464f080af570200", 0x2f}], 0x1, 0x1c, &(0x7f00000003c0)=[@dstype0={0x6, 0xf}], 0x1)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r3, 0x8, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x36, 0x6, 0x40, 0x8d, 0x0, 0x4, 0x40240, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x7, 0x5}, 0x524, 0x195, 0x7fff, 0x7, 0x6, 0x101, 0x4, 0x0, 0xbc53, 0x0, 0x7f}, r3, 0x10, 0xffffffffffffffff, 0x9)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180))
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0xd2, 0x1, 0x1, 0x2, 0x0, 0xff, 0x800, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x2020, 0x400, 0x2, 0x2, 0x200, 0x0, 0x8, 0x0, 0x7f, 0x0, 0xe7df}, 0x0, 0x0, r1, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f00000000c0)={0x0, 0x80}, 0x2)

[  301.259512] FAULT_INJECTION: forcing a failure.
[  301.259512] name failslab, interval 1, probability 0, space 0, times 0
[  301.287188] CPU: 0 PID: 18272 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  301.295086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  301.304434] Call Trace:
[  301.307025]  dump_stack+0x1b2/0x281
[  301.310678]  should_fail.cold+0x10a/0x149
[  301.314823]  ? vsnprintf+0x260/0x1340
[  301.318623]  should_failslab+0xd6/0x130
[  301.322613]  kmem_cache_alloc+0x40/0x3c0
[  301.326676]  __debug_object_init+0x578/0x7a0
[  301.331097]  ? debug_object_destroy+0x240/0x240
[  301.335764]  ? rcu_read_lock_sched_held+0x16c/0x1d0
[  301.340781]  __init_work+0x3f/0x50
[  301.344316]  ? kobj_ns_drop+0x80/0x80
[  301.348109]  call_usermodehelper_setup+0x93/0x2e0
[  301.352948]  kobject_uevent_env+0xc21/0xf30
[  301.357271]  lo_ioctl+0x11a6/0x1cd0
[  301.360894]  ? loop_set_status64+0xe0/0xe0
[  301.365122]  blkdev_ioctl+0x540/0x1830
[  301.369447]  ? __schedule+0x893/0x1de0
[  301.373326]  ? blkpg_ioctl+0x8d0/0x8d0
[  301.377209]  ? rcu_read_unlock_special+0x8db/0xdd0
[  301.382137]  ? lock_downgrade+0x740/0x740
[  301.386280]  block_ioctl+0xd9/0x120
[  301.389898]  ? blkdev_fallocate+0x3a0/0x3a0
[  301.394214]  do_vfs_ioctl+0x75a/0xff0
[  301.398010]  ? ioctl_preallocate+0x1a0/0x1a0
[  301.402413]  ? __fget+0x265/0x3e0
[  301.405863]  ? do_vfs_ioctl+0xff0/0xff0
[  301.409830]  ? security_file_ioctl+0x83/0xb0
[  301.414404]  SyS_ioctl+0x7f/0xb0
[  301.417764]  ? do_vfs_ioctl+0xff0/0xff0
[  301.421730]  do_syscall_64+0x1d5/0x640
[  301.425617]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  301.430799] RIP: 0033:0x7faf49caafc7
[  301.434499] RSP: 002b:00007faf4861ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  301.442198] RAX: ffffffffffffffda RBX: 00007faf49cf4a20 RCX: 00007faf49caafc7
[  301.449460] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
12:09:07 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0xb04, 0x0, 0x10000000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x81, 0x1, 0x8b, 0x1, 0x0, 0x2, 0x2290, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x74a5, 0x401}, 0x1020, 0x10000, 0x1000, 0xa, 0x400, 0x947, 0x1, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x0, r0, 0x1)
close(r1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0xb04, 0x0, 0x10000000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) (async)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x81, 0x1, 0x8b, 0x1, 0x0, 0x2, 0x2290, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x74a5, 0x401}, 0x1020, 0x10000, 0x1000, 0xa, 0x400, 0x947, 0x1, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x0, r0, 0x1) (async)
close(r1) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) (async)

[  301.456810] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007faf486201d0
[  301.464072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  301.471330] R13: 0000000000000004 R14: 0000000020005f98 R15: 0000000000000001
12:09:07 executing program 0:
syncfs(0xffffffffffffffff)
ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000180)) (async)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0xf48c, 0x1f, {<r0=>0xffffffffffffffff}, {}, 0x6, 0x3})
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x5, 0x92, 0x80, 0x9, 0x0, 0x0, 0x80004, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0xfffffffffffffffd, 0xe3}, 0x18104, 0x20, 0x2, 0x3, 0x2, 0x1dda, 0xff, 0x0, 0x3f, 0x0, 0x35}, r0, 0x6, 0xffffffffffffffff, 0x9)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  301.507926] FAULT_INJECTION: forcing a failure.
[  301.507926] name failslab, interval 1, probability 0, space 0, times 0
[  301.538166] vxfs: WRONG superblock magic 00000000 at 1
[  301.558239] vxfs: WRONG superblock magic 00000000 at 8
[  301.573930] vxfs: can't find superblock.
[  301.578216] CPU: 1 PID: 18282 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  301.586095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  301.595447] Call Trace:
[  301.598117]  dump_stack+0x1b2/0x281
[  301.601732]  should_fail.cold+0x10a/0x149
[  301.605875]  should_failslab+0xd6/0x130
[  301.609843]  kmem_cache_alloc_node+0x263/0x410
[  301.614452]  __alloc_skb+0x5c/0x510
[  301.618060]  kobject_uevent_env+0x882/0xf30
[  301.622378]  lo_ioctl+0x11a6/0x1cd0
[  301.625991]  ? loop_set_status64+0xe0/0xe0
[  301.630204]  blkdev_ioctl+0x540/0x1830
[  301.634065]  ? native_iret+0x7/0x7
[  301.637585]  ? blkpg_ioctl+0x8d0/0x8d0
[  301.641455]  ? error_exit+0xb/0x20
[  301.644970]  ? __fget+0x23e/0x3e0
[  301.648403]  block_ioctl+0xd9/0x120
[  301.652016]  ? blkdev_fallocate+0x3a0/0x3a0
[  301.656316]  do_vfs_ioctl+0x75a/0xff0
[  301.660235]  ? lock_acquire+0x170/0x3f0
[  301.664209]  ? ioctl_preallocate+0x1a0/0x1a0
[  301.668612]  ? __fget+0x265/0x3e0
[  301.672052]  ? do_vfs_ioctl+0xff0/0xff0
[  301.676562]  ? security_file_ioctl+0x83/0xb0
[  301.680948]  SyS_ioctl+0x7f/0xb0
[  301.684290]  ? do_vfs_ioctl+0xff0/0xff0
[  301.688252]  do_syscall_64+0x1d5/0x640
[  301.692131]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  301.697298] RIP: 0033:0x7f5c30cedfc7
[  301.700982] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  301.708680] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  301.715938] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  301.723184] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  301.730429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  301.737680] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:09:08 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x5022, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x88, 0x5, 0x8, 0xac, 0x0, 0x0, 0x844e, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x4}, 0x2041, 0x6, 0x100, 0x6, 0x8, 0x8af7, 0x3ff, 0x0, 0x8, 0x0, 0x7fff}, 0xffffffffffffffff, 0xc, r0, 0x1)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:08 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 37)

[  301.777171] vxfs: WRONG superblock magic 00000000 at 1
12:09:08 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 32)

[  301.806060] vxfs: WRONG superblock magic 00000000 at 8
[  301.811409] vxfs: can't find superblock.
12:09:08 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x5022, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x88, 0x5, 0x8, 0xac, 0x0, 0x0, 0x844e, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x4}, 0x2041, 0x6, 0x100, 0x6, 0x8, 0x8af7, 0x3ff, 0x0, 0x8, 0x0, 0x7fff}, 0xffffffffffffffff, 0xc, r0, 0x1)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x5022, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x88, 0x5, 0x8, 0xac, 0x0, 0x0, 0x844e, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x4}, 0x2041, 0x6, 0x100, 0x6, 0x8, 0x8af7, 0x3ff, 0x0, 0x8, 0x0, 0x7fff}, 0xffffffffffffffff, 0xc, r0, 0x1) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)

[  301.867842] FAULT_INJECTION: forcing a failure.
[  301.867842] name failslab, interval 1, probability 0, space 0, times 0
[  301.880095] CPU: 1 PID: 18315 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  301.887999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  301.897436] Call Trace:
[  301.900021]  dump_stack+0x1b2/0x281
[  301.903647]  should_fail.cold+0x10a/0x149
[  301.907971]  should_failslab+0xd6/0x130
[  301.911939]  kmem_cache_alloc_node+0x263/0x410
[  301.916529]  __alloc_skb+0x5c/0x510
[  301.920138]  kobject_uevent_env+0x882/0xf30
[  301.924445]  lo_ioctl+0x11a6/0x1cd0
[  301.928073]  ? loop_set_status64+0xe0/0xe0
[  301.932289]  blkdev_ioctl+0x540/0x1830
[  301.936163]  ? blkpg_ioctl+0x8d0/0x8d0
[  301.940036]  ? trace_hardirqs_on+0x10/0x10
[  301.944258]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  301.949341]  ? debug_check_no_obj_freed+0x2c0/0x680
[  301.954339]  block_ioctl+0xd9/0x120
[  301.957946]  ? blkdev_fallocate+0x3a0/0x3a0
[  301.962257]  do_vfs_ioctl+0x75a/0xff0
[  301.966043]  ? lock_acquire+0x170/0x3f0
[  301.970007]  ? ioctl_preallocate+0x1a0/0x1a0
[  301.974407]  ? __fget+0x265/0x3e0
[  301.977841]  ? do_vfs_ioctl+0xff0/0xff0
[  301.981807]  ? security_file_ioctl+0x83/0xb0
[  301.986211]  SyS_ioctl+0x7f/0xb0
[  301.989552]  ? do_vfs_ioctl+0xff0/0xff0
[  301.993505]  do_syscall_64+0x1d5/0x640
[  301.997377]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  302.002542] RIP: 0033:0x7f5c30cedfc7
[  302.006231] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  302.013928] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  302.021176] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  302.028510] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  302.035845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  302.043106] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
[  302.056588] FAULT_INJECTION: forcing a failure.
[  302.056588] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  302.068384] CPU: 0 PID: 18313 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  302.076249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  302.076535] vxfs: WRONG superblock magic 00000000 at 1
[  302.085603] Call Trace:
[  302.085619]  dump_stack+0x1b2/0x281
[  302.085632]  should_fail.cold+0x10a/0x149
[  302.085646]  __alloc_pages_nodemask+0x22c/0x2720
[  302.085655]  ? kobject_uevent_env+0x274/0xf30
[  302.085671]  ? __lock_acquire+0x5fc/0x3f20
[  302.085684]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  302.085701]  ? blkdev_ioctl+0xf4/0x1830
[  302.085710]  ? blkpg_ioctl+0x8d0/0x8d0
[  302.085718]  ? trace_hardirqs_on+0x10/0x10
[  302.085730]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  302.085743]  cache_grow_begin+0x91/0x700
[  302.085751]  ? fs_reclaim_release+0xd0/0x110
[  302.085762]  ? check_preemption_disabled+0x35/0x240
[  302.085773]  cache_alloc_refill+0x273/0x350
[  302.085787]  kmem_cache_alloc+0x333/0x3c0
[  302.085799]  getname_flags+0xc8/0x550
[  302.085812]  SyS_mkdirat+0x83/0x270
[  302.085823]  ? SyS_mknod+0x30/0x30
[  302.085834]  ? fput_many+0xe/0x140
[  302.091656] vxfs: WRONG superblock magic 00000000 at 8
[  302.093768]  ? do_syscall_64+0x4c/0x640
[  302.093777]  ? SyS_mknod+0x30/0x30
[  302.093786]  do_syscall_64+0x1d5/0x640
[  302.093800]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  302.093823] RIP: 0033:0x7faf49caa317
[  302.093827] RSP: 002b:00007faf4861ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  302.093837] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49caa317
12:09:08 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000)={0x2, 0xbd}, 0x2)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000)={0x2, 0xbd}, 0x2) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)

12:09:08 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 33)

[  302.093846] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  302.101778] vxfs: can't find superblock.
[  302.106343] RBP: 00007faf486201d0 R08: 0000000000000000 R09: 00007faf486201d0
[  302.232011] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  302.239256] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  302.249642] vxfs: WRONG superblock magic 00000000 at 1
[  302.255587] vxfs: WRONG superblock magic 00000000 at 8
[  302.261435] vxfs: can't find superblock.
[  302.297860] FAULT_INJECTION: forcing a failure.
[  302.297860] name failslab, interval 1, probability 0, space 0, times 0
[  302.315077] CPU: 1 PID: 18335 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  302.322971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  302.332311] Call Trace:
[  302.334888]  dump_stack+0x1b2/0x281
[  302.338497]  should_fail.cold+0x10a/0x149
[  302.342627]  should_failslab+0xd6/0x130
[  302.346586]  kmem_cache_alloc_trace+0x29a/0x3d0
[  302.351237]  ? kobj_ns_drop+0x80/0x80
[  302.355023]  call_usermodehelper_setup+0x73/0x2e0
[  302.359848]  kobject_uevent_env+0xc21/0xf30
[  302.364171]  lo_ioctl+0x11a6/0x1cd0
[  302.367795]  ? loop_set_status64+0xe0/0xe0
[  302.372019]  blkdev_ioctl+0x540/0x1830
[  302.375894]  ? blkpg_ioctl+0x8d0/0x8d0
[  302.379765]  ? trace_hardirqs_on+0x10/0x10
[  302.383983]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  302.389081]  ? debug_check_no_obj_freed+0x2c0/0x680
[  302.394084]  block_ioctl+0xd9/0x120
[  302.397693]  ? blkdev_fallocate+0x3a0/0x3a0
[  302.402006]  do_vfs_ioctl+0x75a/0xff0
[  302.405787]  ? lock_acquire+0x170/0x3f0
[  302.409748]  ? ioctl_preallocate+0x1a0/0x1a0
[  302.414146]  ? __fget+0x265/0x3e0
[  302.417582]  ? do_vfs_ioctl+0xff0/0xff0
[  302.421536]  ? security_file_ioctl+0x83/0xb0
[  302.425938]  SyS_ioctl+0x7f/0xb0
[  302.429282]  ? do_vfs_ioctl+0xff0/0xff0
[  302.433238]  do_syscall_64+0x1d5/0x640
[  302.437109]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  302.442280] RIP: 0033:0x7f5c30cedfc7
12:09:08 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x5022, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x88, 0x5, 0x8, 0xac, 0x0, 0x0, 0x844e, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x4}, 0x2041, 0x6, 0x100, 0x6, 0x8, 0x8af7, 0x3ff, 0x0, 0x8, 0x0, 0x7fff}, 0xffffffffffffffff, 0xc, r0, 0x1) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  302.445973] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  302.453664] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  302.460916] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  302.468179] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  302.475432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  302.482683] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:09:08 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 38)

[  302.508145] vxfs: WRONG superblock magic 00000000 at 1
[  302.522123] vxfs: WRONG superblock magic 00000000 at 8
[  302.527407] vxfs: can't find superblock.
[  302.547138] FAULT_INJECTION: forcing a failure.
[  302.547138] name failslab, interval 1, probability 0, space 0, times 0
[  302.559094] CPU: 0 PID: 18349 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  302.566984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  302.576331] Call Trace:
[  302.578906]  dump_stack+0x1b2/0x281
[  302.582520]  should_fail.cold+0x10a/0x149
[  302.586652]  should_failslab+0xd6/0x130
[  302.590616]  kmem_cache_alloc+0x40/0x3c0
[  302.594659]  __es_insert_extent+0x338/0x1360
[  302.599051]  ? __es_shrink+0x8c0/0x8c0
[  302.602923]  ? lock_acquire+0x170/0x3f0
[  302.606876]  ? ext4_es_insert_extent+0x11f/0x530
[  302.611616]  ext4_es_insert_extent+0x1b9/0x530
[  302.616183]  ? ext4_es_find_delayed_extent_range+0x930/0x930
[  302.621964]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  302.627398]  ? ext4_es_find_delayed_extent_range+0x646/0x930
[  302.633189]  ext4_ext_map_blocks+0x1e2c/0x6b10
[  302.637753]  ? __lock_acquire+0x5fc/0x3f20
[  302.641973]  ? __lock_acquire+0x5fc/0x3f20
[  302.646194]  ? mark_buffer_dirty+0x95/0x480
[  302.650497]  ? trace_hardirqs_on+0x10/0x10
[  302.654714]  ? __ext4_handle_dirty_metadata+0x120/0x480
[  302.660058]  ? ext4_find_delalloc_cluster+0x180/0x180
[  302.665229]  ? trace_hardirqs_on+0x10/0x10
[  302.669445]  ? ext4_mark_iloc_dirty+0x1822/0x26a0
[  302.674273]  ? ext4_es_lookup_extent+0x321/0xac0
[  302.679011]  ? lock_acquire+0x170/0x3f0
[  302.682972]  ? lock_acquire+0x170/0x3f0
[  302.686927]  ? ext4_map_blocks+0x29f/0x1730
[  302.691233]  ext4_map_blocks+0xb19/0x1730
[  302.695369]  ? ext4_issue_zeroout+0x150/0x150
[  302.699845]  ? __ext4_new_inode+0x27c/0x4eb0
[  302.704238]  ext4_getblk+0x98/0x3f0
[  302.707849]  ? ext4_iomap_begin+0x7f0/0x7f0
[  302.712158]  ext4_bread+0x6c/0x1a0
[  302.715679]  ? ext4_getblk+0x3f0/0x3f0
[  302.719553]  ? dquot_initialize_needed+0x240/0x240
[  302.724550]  ext4_append+0x143/0x350
[  302.728345]  ext4_mkdir+0x4c9/0xbd0
[  302.731958]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  302.736611]  ? security_inode_mkdir+0xca/0x100
[  302.741179]  vfs_mkdir+0x463/0x6e0
[  302.744711]  SyS_mkdirat+0x1fd/0x270
[  302.748406]  ? SyS_mknod+0x30/0x30
[  302.751929]  ? fput_many+0xe/0x140
[  302.755455]  ? do_syscall_64+0x4c/0x640
[  302.759407]  ? SyS_mknod+0x30/0x30
[  302.762927]  do_syscall_64+0x1d5/0x640
[  302.766799]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  302.771970] RIP: 0033:0x7faf49caa317
[  302.775662] RSP: 002b:00007faf4861ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  302.783350] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49caa317
[  302.790694] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  302.797947] RBP: 00007faf486201d0 R08: 0000000000000000 R09: 00007faf486201d0
12:09:09 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x10000, 0x0, 0xffffffffffffffff})
preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000340)=""/191, 0xbf}], 0x5, 0x7fff, 0xe94)

12:09:09 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async, rerun: 32)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (rerun: 32)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01f607000000610300000096", @ANYRES32=<r2=>0xffffffffffffffff, @ANYBLOB="fdffffff000000002e2f66696c653000"])
perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x4, 0x4, 0x2, 0x0, 0x0, 0x7, 0x200, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x1, 0x1}, 0x33, 0x80000000, 0x401, 0x0, 0x100000001, 0x7, 0x3f, 0x0, 0xffffffc1, 0x0, 0x8}, 0xffffffffffffffff, 0x10, r2, 0x0) (async)
r3 = gettid()
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r3, 0xa, r4, 0xb)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000180)) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180)) (async, rerun: 32)
syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f0000000300)="ba210066edf36f2ff20f1bdf0f01c8ddd20f20d86635200000000f22d8b800008ec80f013f26656464f080af570200", 0x2f}], 0x1, 0x1c, &(0x7f00000003c0)=[@dstype0={0x6, 0xf}], 0x1) (rerun: 32)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r3, 0x8, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x36, 0x6, 0x40, 0x8d, 0x0, 0x4, 0x40240, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x7, 0x5}, 0x524, 0x195, 0x7fff, 0x7, 0x6, 0x101, 0x4, 0x0, 0xbc53, 0x0, 0x7f}, r3, 0x10, 0xffffffffffffffff, 0x9) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) (async)
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0xd2, 0x1, 0x1, 0x2, 0x0, 0xff, 0x800, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x2020, 0x400, 0x2, 0x2, 0x200, 0x0, 0x8, 0x0, 0x7f, 0x0, 0xe7df}, 0x0, 0x0, r1, 0x2) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r0, &(0x7f00000000c0)={0x0, 0x80}, 0x2)

12:09:09 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180))
perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x4, 0x14, 0x2, 0x2f, 0x0, 0x81, 0xc120, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x2, 0x6}, 0x1, 0x0, 0x7ff, 0x1, 0x7f, 0x4, 0x3f, 0x0, 0x4, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r2, 0x9)
r3 = signalfd(r0, &(0x7f0000000000)={[0x7]}, 0x8)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x24}}, './file0\x00'})

12:09:09 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async, rerun: 32)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) (async)
perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x4, 0x14, 0x2, 0x2f, 0x0, 0x81, 0xc120, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x2, 0x6}, 0x1, 0x0, 0x7ff, 0x1, 0x7f, 0x4, 0x3f, 0x0, 0x4, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r2, 0x9) (async)
r3 = signalfd(r0, &(0x7f0000000000)={[0x7]}, 0x8)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x24}}, './file0\x00'})

[  302.805195] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  302.812446] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
12:09:09 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x10000, 0x0, 0xffffffffffffffff})
preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000340)=""/191, 0xbf}], 0x5, 0x7fff, 0xe94)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x10000, 0x0, 0xffffffffffffffff}) (async)
preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000340)=""/191, 0xbf}], 0x5, 0x7fff, 0xe94) (async)

[  302.866222] vxfs: WRONG superblock magic 00000000 at 1
[  302.874290] vxfs: WRONG superblock magic 00000000 at 8
[  302.885488] vxfs: can't find superblock.
12:09:09 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 34)

12:09:09 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 39)

12:09:09 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) (async)
perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x4, 0x14, 0x2, 0x2f, 0x0, 0x81, 0xc120, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x2, 0x6}, 0x1, 0x0, 0x7ff, 0x1, 0x7f, 0x4, 0x3f, 0x0, 0x4, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r2, 0x9)
r3 = signalfd(r0, &(0x7f0000000000)={[0x7]}, 0x8)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x24}}, './file0\x00'})

[  302.970511] FAULT_INJECTION: forcing a failure.
[  302.970511] name failslab, interval 1, probability 0, space 0, times 0
[  302.984184] FAULT_INJECTION: forcing a failure.
[  302.984184] name failslab, interval 1, probability 0, space 0, times 0
[  302.998469] CPU: 1 PID: 18386 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  303.006390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  303.015743] Call Trace:
[  303.018331]  dump_stack+0x1b2/0x281
[  303.021961]  should_fail.cold+0x10a/0x149
[  303.026106]  should_failslab+0xd6/0x130
[  303.030079]  __kmalloc+0x2c1/0x400
[  303.033619]  ? ext4_find_extent+0x879/0xbc0
[  303.037936]  ext4_find_extent+0x879/0xbc0
[  303.042079]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  303.047529]  ext4_ext_map_blocks+0x19a/0x6b10
[  303.052037]  ? __lock_acquire+0x5fc/0x3f20
[  303.056277]  ? __lock_acquire+0x5fc/0x3f20
[  303.060517]  ? mark_buffer_dirty+0x95/0x480
[  303.064837]  ? trace_hardirqs_on+0x10/0x10
[  303.069082]  ? __ext4_handle_dirty_metadata+0x120/0x480
[  303.074448]  ? ext4_find_delalloc_cluster+0x180/0x180
[  303.079638]  ? trace_hardirqs_on+0x10/0x10
[  303.083878]  ? ext4_mark_iloc_dirty+0x1822/0x26a0
[  303.088728]  ? ext4_es_lookup_extent+0x321/0xac0
[  303.093486]  ? lock_acquire+0x170/0x3f0
[  303.097467]  ? lock_acquire+0x170/0x3f0
[  303.101613]  ? ext4_map_blocks+0x29f/0x1730
[  303.105946]  ext4_map_blocks+0xb19/0x1730
[  303.110107]  ? ext4_issue_zeroout+0x150/0x150
[  303.114608]  ? __ext4_new_inode+0x27c/0x4eb0
[  303.119132]  ext4_getblk+0x98/0x3f0
[  303.122750]  ? ext4_iomap_begin+0x7f0/0x7f0
[  303.127066]  ext4_bread+0x6c/0x1a0
[  303.130601]  ? ext4_getblk+0x3f0/0x3f0
[  303.134475]  ? dquot_initialize_needed+0x240/0x240
[  303.139401]  ext4_append+0x143/0x350
[  303.143111]  ext4_mkdir+0x4c9/0xbd0
[  303.146750]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  303.151420]  ? security_inode_mkdir+0xca/0x100
[  303.156001]  vfs_mkdir+0x463/0x6e0
[  303.159539]  SyS_mkdirat+0x1fd/0x270
[  303.163242]  ? SyS_mknod+0x30/0x30
[  303.166772]  ? fput_many+0xe/0x140
[  303.170299]  ? do_syscall_64+0x4c/0x640
[  303.174257]  ? SyS_mknod+0x30/0x30
[  303.177789]  do_syscall_64+0x1d5/0x640
[  303.181674]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  303.186849] RIP: 0033:0x7faf49caa317
[  303.190552] RSP: 002b:00007faf4861ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  303.198332] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49caa317
[  303.205595] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  303.212861] RBP: 00007faf486201d0 R08: 0000000000000000 R09: 00007faf486201d0
[  303.220119] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  303.227394] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  303.234677] CPU: 0 PID: 18383 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  303.242560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  303.251935] Call Trace:
[  303.254563]  dump_stack+0x1b2/0x281
[  303.258196]  should_fail.cold+0x10a/0x149
[  303.262425]  should_failslab+0xd6/0x130
[  303.266403]  kmem_cache_alloc_trace+0x29a/0x3d0
[  303.271065]  ? kobj_ns_drop+0x80/0x80
[  303.274871]  call_usermodehelper_setup+0x73/0x2e0
[  303.279735]  kobject_uevent_env+0xc21/0xf30
[  303.284059]  lo_ioctl+0x11a6/0x1cd0
[  303.287708]  ? loop_set_status64+0xe0/0xe0
[  303.291985]  blkdev_ioctl+0x540/0x1830
[  303.295868]  ? blkpg_ioctl+0x8d0/0x8d0
[  303.299878]  ? trace_hardirqs_on+0x10/0x10
[  303.304113]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  303.309209]  ? debug_check_no_obj_freed+0x2c0/0x680
[  303.314226]  block_ioctl+0xd9/0x120
[  303.317858]  ? blkdev_fallocate+0x3a0/0x3a0
[  303.322171]  do_vfs_ioctl+0x75a/0xff0
[  303.325984]  ? lock_acquire+0x170/0x3f0
[  303.329946]  ? ioctl_preallocate+0x1a0/0x1a0
[  303.334359]  ? __fget+0x265/0x3e0
[  303.337800]  ? do_vfs_ioctl+0xff0/0xff0
[  303.341820]  ? security_file_ioctl+0x83/0xb0
[  303.346219]  SyS_ioctl+0x7f/0xb0
[  303.349579]  ? do_vfs_ioctl+0xff0/0xff0
[  303.353543]  do_syscall_64+0x1d5/0x640
[  303.357604]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  303.362793] RIP: 0033:0x7f5c30cedfc7
12:09:09 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000)={0x2, 0xbd}, 0x2) (async)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

[  303.366489] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  303.374183] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
[  303.381453] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  303.388706] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  303.395964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  303.403302] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:09:09 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x10000, 0x0, 0xffffffffffffffff}) (async)
preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000340)=""/191, 0xbf}], 0x5, 0x7fff, 0xe94)

[  303.436781] vxfs: WRONG superblock magic 00000000 at 1
12:09:09 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01f607000000610300000096", @ANYRES32=<r2=>0xffffffffffffffff, @ANYBLOB="fdffffff000000002e2f66696c653000"])
perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x4, 0x4, 0x2, 0x0, 0x0, 0x7, 0x200, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x1, 0x1}, 0x33, 0x80000000, 0x401, 0x0, 0x100000001, 0x7, 0x3f, 0x0, 0xffffffc1, 0x0, 0x8}, 0xffffffffffffffff, 0x10, r2, 0x0)
r3 = gettid()
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r3, 0xa, r4, 0xb)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000180))
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180))
syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f0000000300)="ba210066edf36f2ff20f1bdf0f01c8ddd20f20d86635200000000f22d8b800008ec80f013f26656464f080af570200", 0x2f}], 0x1, 0x1c, &(0x7f00000003c0)=[@dstype0={0x6, 0xf}], 0x1)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r3, 0x8, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x36, 0x6, 0x40, 0x8d, 0x0, 0x4, 0x40240, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x7, 0x5}, 0x524, 0x195, 0x7fff, 0x7, 0x6, 0x101, 0x4, 0x0, 0xbc53, 0x0, 0x7f}, r3, 0x10, 0xffffffffffffffff, 0x9)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180))
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0xd2, 0x1, 0x1, 0x2, 0x0, 0xff, 0x800, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x2020, 0x400, 0x2, 0x2, 0x200, 0x0, 0x8, 0x0, 0x7f, 0x0, 0xe7df}, 0x0, 0x0, r1, 0x2)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f00000000c0)={0x0, 0x80}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01f607000000610300000096", @ANYRES32, @ANYBLOB="fdffffff000000002e2f66696c653000"]) (async)
perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x4, 0x4, 0x2, 0x0, 0x0, 0x7, 0x200, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x1, 0x1}, 0x33, 0x80000000, 0x401, 0x0, 0x100000001, 0x7, 0x3f, 0x0, 0xffffffc1, 0x0, 0x8}, 0xffffffffffffffff, 0x10, r2, 0x0) (async)
gettid() (async)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r3, 0xa, r4, 0xb) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000180)) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180)) (async)
syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f0000000300)="ba210066edf36f2ff20f1bdf0f01c8ddd20f20d86635200000000f22d8b800008ec80f013f26656464f080af570200", 0x2f}], 0x1, 0x1c, &(0x7f00000003c0)=[@dstype0={0x6, 0xf}], 0x1) (async)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r3, 0x8, 0xffffffffffffffff, 0x9) (async)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x36, 0x6, 0x40, 0x8d, 0x0, 0x4, 0x40240, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x7, 0x5}, 0x524, 0x195, 0x7fff, 0x7, 0x6, 0x101, 0x4, 0x0, 0xbc53, 0x0, 0x7f}, r3, 0x10, 0xffffffffffffffff, 0x9) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) (async)
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0xd2, 0x1, 0x1, 0x2, 0x0, 0xff, 0x800, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x2020, 0x400, 0x2, 0x2, 0x200, 0x0, 0x8, 0x0, 0x7f, 0x0, 0xe7df}, 0x0, 0x0, r1, 0x2) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r0, &(0x7f00000000c0)={0x0, 0x80}, 0x2) (async)

12:09:09 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
fstat(r0, &(0x7f00000000c0))

12:09:09 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
fstat(r0, &(0x7f00000000c0))
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
fstat(r0, &(0x7f00000000c0)) (async)

[  303.491299] vxfs: WRONG superblock magic 00000000 at 8
[  303.504850] vxfs: can't find superblock.
[  303.514794] vxfs: WRONG superblock magic 00000000 at 1
[  303.526666] vxfs: WRONG superblock magic 00000000 at 8
[  303.534453] vxfs: can't find superblock.
12:09:09 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
fstat(r0, &(0x7f00000000c0))

12:09:09 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 35)

12:09:09 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 40)

12:09:09 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140))
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_discard_blocks\x00', r1}, 0x10)
io_setup(0x3f, &(0x7f0000000140)=<r3=>0x0)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000100)={0x0, 0x0, <r4=>0xffffffffffffffff})
r5 = dup2(r2, r0)
r6 = syz_open_dev$usbfs(&(0x7f0000000380), 0x3eb, 0x30b200)
ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, <r7=>r1, {0x3, 0x101}}, './file0\x00'})
io_submit(0x0, 0x4, &(0x7f0000000480)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x200, r4, &(0x7f0000000180)="d01571e270ee661add1e6a5be2dc607694db2c40604bcb7d3594456d3ca758a27bb2c03fdce9b571ba27f89451868a911543a4a2e35bc8897e6034afde29380c58565dafa6a058080c138403881b5c0cc8705822de8ba7cdd618e2151407aec357bce3aa59b47031fe4b085d2521c18e854a4048d0e88321e847f20bb010a0cda13fdc5c80c43aaf18", 0x89, 0x7, 0x0, 0x0, r1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x6, r2, &(0x7f0000000280)="ed57b3471ca6d5951cf01c98", 0xc, 0xffffffff, 0x0, 0x1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="d8ec9f", 0x3, 0x7fff, 0x0, 0x3, r5}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x8000, r6, &(0x7f00000003c0)="b30be715c6ed16d0d00e19a762fce768fba5d26384abcd379994b63e8623813e", 0x20, 0x2, 0x0, 0x1, r7}])

12:09:10 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb3f, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  303.633538] FAULT_INJECTION: forcing a failure.
[  303.633538] name failslab, interval 1, probability 0, space 0, times 0
[  303.653429] CPU: 0 PID: 18446 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  303.661329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  303.670710] Call Trace:
[  303.673302]  dump_stack+0x1b2/0x281
[  303.676937]  should_fail.cold+0x10a/0x149
[  303.681089]  should_failslab+0xd6/0x130
[  303.685064]  __kmalloc+0x2c1/0x400
[  303.688605]  ? ext4_find_extent+0x879/0xbc0
[  303.692935]  ext4_find_extent+0x879/0xbc0
[  303.697088]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  303.702539]  ext4_ext_map_blocks+0x19a/0x6b10
[  303.707040]  ? __lock_acquire+0x5fc/0x3f20
[  303.711281]  ? check_preemption_disabled+0x35/0x240
[  303.716300]  ? perf_trace_lock+0xf7/0x490
[  303.720451]  ? ext4_find_delalloc_cluster+0x180/0x180
[  303.726405]  ? perf_trace_lock+0xf7/0x490
[  303.730556]  ? perf_trace_lock_acquire+0x510/0x510
[  303.735487]  ? ext4_es_lookup_extent+0x321/0xac0
[  303.740249]  ? lock_acquire+0x170/0x3f0
[  303.744228]  ? lock_acquire+0x170/0x3f0
[  303.748203]  ? ext4_map_blocks+0x623/0x1730
[  303.752532]  ext4_map_blocks+0x675/0x1730
[  303.756685]  ? ext4_issue_zeroout+0x150/0x150
[  303.761175]  ? __ext4_new_inode+0x27c/0x4eb0
[  303.761676] FAULT_INJECTION: forcing a failure.
[  303.761676] name failslab, interval 1, probability 0, space 0, times 0
[  303.765590]  ext4_getblk+0x98/0x3f0
[  303.780405]  ? ext4_iomap_begin+0x7f0/0x7f0
[  303.784733]  ext4_bread+0x6c/0x1a0
[  303.788262]  ? ext4_getblk+0x3f0/0x3f0
[  303.792138]  ? dquot_initialize_needed+0x240/0x240
[  303.797063]  ext4_append+0x143/0x350
[  303.800763]  ext4_mkdir+0x4c9/0xbd0
[  303.804387]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  303.809060]  ? security_inode_mkdir+0xca/0x100
[  303.813671]  vfs_mkdir+0x463/0x6e0
[  303.817205]  SyS_mkdirat+0x1fd/0x270
[  303.820919]  ? SyS_mknod+0x30/0x30
[  303.824460]  ? fput_many+0xe/0x140
[  303.827997]  ? do_syscall_64+0x4c/0x640
[  303.831968]  ? SyS_mknod+0x30/0x30
[  303.835506]  do_syscall_64+0x1d5/0x640
[  303.839397]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  303.844580] RIP: 0033:0x7faf49caa317
[  303.848288] RSP: 002b:00007faf4861ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  303.855992] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49caa317
[  303.863265] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  303.870525] RBP: 00007faf486201d0 R08: 0000000000000000 R09: 00007faf486201d0
[  303.877783] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  303.885041] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  303.892420] CPU: 1 PID: 18452 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  303.900300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  303.909640] Call Trace:
[  303.912221]  dump_stack+0x1b2/0x281
[  303.915832]  should_fail.cold+0x10a/0x149
[  303.919965]  should_failslab+0xd6/0x130
[  303.923928]  kmem_cache_alloc_trace+0x29a/0x3d0
[  303.928589]  ? kobj_ns_drop+0x80/0x80
[  303.932384]  call_usermodehelper_setup+0x73/0x2e0
[  303.937216]  kobject_uevent_env+0xc21/0xf30
[  303.941538]  lo_ioctl+0x11a6/0x1cd0
[  303.945161]  ? loop_set_status64+0xe0/0xe0
[  303.949388]  blkdev_ioctl+0x540/0x1830
[  303.953264]  ? blkpg_ioctl+0x8d0/0x8d0
[  303.957145]  ? perf_trace_lock+0xf7/0x490
[  303.961284]  ? perf_trace_lock_acquire+0x510/0x510
[  303.966198]  block_ioctl+0xd9/0x120
[  303.969810]  ? blkdev_fallocate+0x3a0/0x3a0
[  303.974122]  do_vfs_ioctl+0x75a/0xff0
[  303.977910]  ? lock_acquire+0x170/0x3f0
[  303.981875]  ? ioctl_preallocate+0x1a0/0x1a0
[  303.986267]  ? __fget+0x265/0x3e0
[  303.989703]  ? do_vfs_ioctl+0xff0/0xff0
[  303.993657]  ? security_file_ioctl+0x83/0xb0
[  303.998048]  SyS_ioctl+0x7f/0xb0
[  304.001478]  ? do_vfs_ioctl+0xff0/0xff0
[  304.005434]  do_syscall_64+0x1d5/0x640
[  304.009313]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  304.014492] RIP: 0033:0x7f5c30cedfc7
[  304.018185] RSP: 002b:00007f5c2f662f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  304.025889] RAX: ffffffffffffffda RBX: 00007f5c30d37a20 RCX: 00007f5c30cedfc7
12:09:10 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb3f, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb3f, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  304.033149] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005
[  304.040401] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  304.047666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  304.054923] R13: 0000000000000004 R14: 0000000020005fc8 R15: 0000000000000003
12:09:10 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 41)

[  304.086597] vxfs: WRONG superblock magic 00000000 at 1
[  304.105222] vxfs: WRONG superblock magic 00000000 at 8
[  304.110764] vxfs: can't find superblock.
[  304.140244] FAULT_INJECTION: forcing a failure.
[  304.140244] name failslab, interval 1, probability 0, space 0, times 0
[  304.157275] CPU: 0 PID: 18469 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  304.165200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  304.174658] Call Trace:
[  304.177239]  dump_stack+0x1b2/0x281
[  304.180855]  should_fail.cold+0x10a/0x149
[  304.184990]  should_failslab+0xd6/0x130
[  304.188963]  __kmalloc+0x2c1/0x400
[  304.192492]  ? ext4_find_extent+0x879/0xbc0
[  304.196798]  ext4_find_extent+0x879/0xbc0
[  304.200938]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  304.206504]  ext4_ext_map_blocks+0x19a/0x6b10
[  304.210994]  ? __lock_acquire+0x5fc/0x3f20
[  304.215219]  ? check_preemption_disabled+0x35/0x240
[  304.220223]  ? perf_trace_lock+0xf7/0x490
[  304.224358]  ? ext4_find_delalloc_cluster+0x180/0x180
[  304.229539]  ? perf_trace_lock+0xf7/0x490
[  304.233670]  ? perf_trace_lock_acquire+0x510/0x510
[  304.238578]  ? ext4_es_lookup_extent+0x321/0xac0
[  304.243317]  ? lock_acquire+0x170/0x3f0
[  304.247281]  ? lock_acquire+0x170/0x3f0
[  304.251239]  ? ext4_map_blocks+0x623/0x1730
[  304.255639]  ext4_map_blocks+0x675/0x1730
[  304.259790]  ? ext4_issue_zeroout+0x150/0x150
[  304.264265]  ? __ext4_new_inode+0x27c/0x4eb0
[  304.268678]  ext4_getblk+0x98/0x3f0
[  304.272286]  ? ext4_iomap_begin+0x7f0/0x7f0
[  304.276593]  ext4_bread+0x6c/0x1a0
[  304.280226]  ? ext4_getblk+0x3f0/0x3f0
[  304.284094]  ? dquot_initialize_needed+0x240/0x240
[  304.289005]  ext4_append+0x143/0x350
[  304.292707]  ext4_mkdir+0x4c9/0xbd0
[  304.296322]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  304.300975]  ? security_inode_mkdir+0xca/0x100
[  304.305537]  vfs_mkdir+0x463/0x6e0
[  304.309061]  SyS_mkdirat+0x1fd/0x270
[  304.312758]  ? SyS_mknod+0x30/0x30
[  304.316276]  ? fput_many+0xe/0x140
[  304.319798]  ? do_syscall_64+0x4c/0x640
[  304.323752]  ? SyS_mknod+0x30/0x30
[  304.327448]  do_syscall_64+0x1d5/0x640
[  304.331366]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  304.336536] RIP: 0033:0x7faf49caa317
12:09:10 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140))
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_discard_blocks\x00', r1}, 0x10)
io_setup(0x3f, &(0x7f0000000140)=<r3=>0x0)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000100)={0x0, 0x0, <r4=>0xffffffffffffffff})
r5 = dup2(r2, r0)
r6 = syz_open_dev$usbfs(&(0x7f0000000380), 0x3eb, 0x30b200)
ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, <r7=>r1, {0x3, 0x101}}, './file0\x00'})
io_submit(0x0, 0x4, &(0x7f0000000480)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x200, r4, &(0x7f0000000180)="d01571e270ee661add1e6a5be2dc607694db2c40604bcb7d3594456d3ca758a27bb2c03fdce9b571ba27f89451868a911543a4a2e35bc8897e6034afde29380c58565dafa6a058080c138403881b5c0cc8705822de8ba7cdd618e2151407aec357bce3aa59b47031fe4b085d2521c18e854a4048d0e88321e847f20bb010a0cda13fdc5c80c43aaf18", 0x89, 0x7, 0x0, 0x0, r1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x6, r2, &(0x7f0000000280)="ed57b3471ca6d5951cf01c98", 0xc, 0xffffffff, 0x0, 0x1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="d8ec9f", 0x3, 0x7fff, 0x0, 0x3, r5}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x8000, r6, &(0x7f00000003c0)="b30be715c6ed16d0d00e19a762fce768fba5d26384abcd379994b63e8623813e", 0x20, 0x2, 0x0, 0x1, r7}])
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140)) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_discard_blocks\x00', r1}, 0x10) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000100)) (async)
dup2(r2, r0) (async)
syz_open_dev$usbfs(&(0x7f0000000380), 0x3eb, 0x30b200) (async)
ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3, 0x101}}, './file0\x00'}) (async)
io_submit(0x0, 0x4, &(0x7f0000000480)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x200, r4, &(0x7f0000000180)="d01571e270ee661add1e6a5be2dc607694db2c40604bcb7d3594456d3ca758a27bb2c03fdce9b571ba27f89451868a911543a4a2e35bc8897e6034afde29380c58565dafa6a058080c138403881b5c0cc8705822de8ba7cdd618e2151407aec357bce3aa59b47031fe4b085d2521c18e854a4048d0e88321e847f20bb010a0cda13fdc5c80c43aaf18", 0x89, 0x7, 0x0, 0x0, r1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x6, r2, &(0x7f0000000280)="ed57b3471ca6d5951cf01c98", 0xc, 0xffffffff, 0x0, 0x1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="d8ec9f", 0x3, 0x7fff, 0x0, 0x3, r5}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x8000, r6, &(0x7f00000003c0)="b30be715c6ed16d0d00e19a762fce768fba5d26384abcd379994b63e8623813e", 0x20, 0x2, 0x0, 0x1, r7}]) (async)

12:09:10 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffc1}, 0x0, 0x800000, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:10 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/171, 0xab}], 0x1, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180))
ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000000)=0x2454400)

12:09:10 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb3f, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb3f, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  304.340224] RSP: 002b:00007faf4861ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  304.347914] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49caa317
[  304.355254] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  304.362520] RBP: 00007faf486201d0 R08: 0000000000000000 R09: 00007faf486201d0
[  304.369770] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  304.377033] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
12:09:10 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffc1}, 0x0, 0x800000, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffc1}, 0x0, 0x800000, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

12:09:10 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 36)

12:09:10 executing program 5:
r0 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800)
fchmod(r0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:09:10 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffc1}, 0x0, 0x800000, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:10 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 42)

[  304.505922] FAULT_INJECTION: forcing a failure.
[  304.505922] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  304.517740] CPU: 1 PID: 18507 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  304.521480] FAULT_INJECTION: forcing a failure.
[  304.521480] name failslab, interval 1, probability 0, space 0, times 0
[  304.525686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  304.525691] Call Trace:
[  304.525708]  dump_stack+0x1b2/0x281
[  304.525726]  should_fail.cold+0x10a/0x149
[  304.556527]  __alloc_pages_nodemask+0x22c/0x2720
[  304.561267]  ? kobject_uevent_env+0x274/0xf30
[  304.565759]  ? __lock_acquire+0x5fc/0x3f20
[  304.569980]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  304.574834]  ? blkdev_ioctl+0xf4/0x1830
[  304.578809]  ? blkpg_ioctl+0x8d0/0x8d0
[  304.582677]  ? trace_hardirqs_on+0x10/0x10
[  304.586898]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  304.591992]  cache_grow_begin+0x91/0x700
[  304.596034]  ? fs_reclaim_release+0xd0/0x110
[  304.600424]  ? check_preemption_disabled+0x35/0x240
[  304.605420]  cache_alloc_refill+0x273/0x350
[  304.609726]  kmem_cache_alloc+0x333/0x3c0
[  304.613861]  getname_flags+0xc8/0x550
[  304.617644]  SyS_mkdirat+0x83/0x270
[  304.621250]  ? SyS_mknod+0x30/0x30
[  304.624772]  ? fput_many+0xe/0x140
[  304.628295]  ? do_syscall_64+0x4c/0x640
[  304.632247]  ? SyS_mknod+0x30/0x30
[  304.635775]  do_syscall_64+0x1d5/0x640
[  304.639652]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  304.644823] RIP: 0033:0x7f5c30ced317
[  304.648510] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
12:09:11 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140)) (async)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_discard_blocks\x00', r1}, 0x10) (async)
io_setup(0x3f, &(0x7f0000000140)=<r3=>0x0)
io_cancel(r3, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async, rerun: 64)
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000100)={0x0, 0x0, <r4=>0xffffffffffffffff}) (async, rerun: 64)
r5 = dup2(r2, r0) (async, rerun: 32)
r6 = syz_open_dev$usbfs(&(0x7f0000000380), 0x3eb, 0x30b200) (rerun: 32)
ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, <r7=>r1, {0x3, 0x101}}, './file0\x00'})
io_submit(0x0, 0x4, &(0x7f0000000480)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x200, r4, &(0x7f0000000180)="d01571e270ee661add1e6a5be2dc607694db2c40604bcb7d3594456d3ca758a27bb2c03fdce9b571ba27f89451868a911543a4a2e35bc8897e6034afde29380c58565dafa6a058080c138403881b5c0cc8705822de8ba7cdd618e2151407aec357bce3aa59b47031fe4b085d2521c18e854a4048d0e88321e847f20bb010a0cda13fdc5c80c43aaf18", 0x89, 0x7, 0x0, 0x0, r1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x6, r2, &(0x7f0000000280)="ed57b3471ca6d5951cf01c98", 0xc, 0xffffffff, 0x0, 0x1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="d8ec9f", 0x3, 0x7fff, 0x0, 0x3, r5}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x8000, r6, &(0x7f00000003c0)="b30be715c6ed16d0d00e19a762fce768fba5d26384abcd379994b63e8623813e", 0x20, 0x2, 0x0, 0x1, r7}])

12:09:11 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
read(r1, &(0x7f0000000140)=""/87, 0x57)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0)

[  304.656202] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30ced317
[  304.663452] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  304.670724] RBP: 00007f5c2f6631d0 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  304.677974] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  304.685226] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
[  304.692488] CPU: 0 PID: 18518 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  304.700383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  304.709735] Call Trace:
[  304.712329]  dump_stack+0x1b2/0x281
[  304.713640] vxfs: WRONG superblock magic 00000000 at 1
[  304.715957]  should_fail.cold+0x10a/0x149
[  304.715972]  should_failslab+0xd6/0x130
[  304.715985]  kmem_cache_alloc+0x28e/0x3c0
[  304.715997]  ext4_mb_new_blocks+0x514/0x3db0
[  304.721621] vxfs: WRONG superblock magic 00000000 at 8
[  304.725399]  ? ext4_find_extent+0x6f7/0xbc0
[  304.725408]  ? ext4_ext_search_right+0x2bc/0xaa0
[  304.725419]  ? ext4_inode_to_goal_block+0x29a/0x3b0
[  304.725435]  ext4_ext_map_blocks+0x2845/0x6b10
[  304.729481] vxfs: can't find superblock.
[  304.733525]  ? __lock_acquire+0x5fc/0x3f20
[  304.733556]  ? mark_buffer_dirty+0x95/0x480
[  304.733565]  ? trace_hardirqs_on+0x10/0x10
[  304.733572]  ? __ext4_handle_dirty_metadata+0x120/0x480
[  304.733580]  ? ext4_find_delalloc_cluster+0x180/0x180
[  304.733587]  ? trace_hardirqs_on+0x10/0x10
[  304.733598]  ? ext4_mark_iloc_dirty+0x1822/0x26a0
[  304.733610]  ? ext4_es_lookup_extent+0x321/0xac0
[  304.733620]  ? lock_acquire+0x170/0x3f0
[  304.733642]  ext4_map_blocks+0x675/0x1730
[  304.811045]  ? ext4_issue_zeroout+0x150/0x150
[  304.815535]  ? __ext4_new_inode+0x27c/0x4eb0
[  304.819939]  ext4_getblk+0x98/0x3f0
[  304.823553]  ? ext4_iomap_begin+0x7f0/0x7f0
[  304.827872]  ext4_bread+0x6c/0x1a0
[  304.831400]  ? ext4_getblk+0x3f0/0x3f0
[  304.835288]  ? dquot_initialize_needed+0x240/0x240
[  304.840212]  ext4_append+0x143/0x350
[  304.843918]  ext4_mkdir+0x4c9/0xbd0
[  304.847538]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  304.852197]  ? security_inode_mkdir+0xca/0x100
[  304.856782]  vfs_mkdir+0x463/0x6e0
[  304.860310]  SyS_mkdirat+0x1fd/0x270
[  304.864013]  ? SyS_mknod+0x30/0x30
[  304.867538]  ? fput_many+0xe/0x140
[  304.871159]  ? do_syscall_64+0x4c/0x640
[  304.875140]  ? SyS_mknod+0x30/0x30
[  304.878688]  do_syscall_64+0x1d5/0x640
[  304.882578]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  304.887756] RIP: 0033:0x7faf49caa317
[  304.891455] RSP: 002b:00007faf4861ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  304.899154] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49caa317
12:09:11 executing program 5:
r0 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800)
fchmod(r0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  304.906407] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  304.913684] RBP: 00007faf486201d0 R08: 0000000000000000 R09: 00007faf486201d0
[  304.920955] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  304.928207] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
12:09:11 executing program 5:
r0 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800)
fchmod(r0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:09:11 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 37)

[  305.058322] FAULT_INJECTION: forcing a failure.
[  305.058322] name failslab, interval 1, probability 0, space 0, times 0
[  305.085755] CPU: 0 PID: 18543 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  305.093666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  305.103118] Call Trace:
[  305.105708]  dump_stack+0x1b2/0x281
[  305.109342]  should_fail.cold+0x10a/0x149
[  305.113513]  should_failslab+0xd6/0x130
[  305.117494]  kmem_cache_alloc+0x28e/0x3c0
[  305.121643]  ? ext4_sync_fs+0x7e0/0x7e0
[  305.125619]  ext4_alloc_inode+0x1a/0x640
[  305.129685]  ? ext4_sync_fs+0x7e0/0x7e0
[  305.133653]  alloc_inode+0x5d/0x170
[  305.137272]  new_inode+0x1d/0xf0
[  305.140629]  __ext4_new_inode+0x360/0x4eb0
[  305.144852]  ? kmem_cache_free+0x7c/0x2b0
[  305.148988]  ? putname+0xcd/0x110
[  305.152435]  ? SyS_mkdirat+0x95/0x270
[  305.156220]  ? entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  305.161600]  ? ext4_free_inode+0x1460/0x1460
[  305.165993]  ? lock_downgrade+0x740/0x740
[  305.170143]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  305.175230]  ? dquot_initialize_needed+0x240/0x240
[  305.180153]  ext4_mkdir+0x2e4/0xbd0
[  305.183775]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  305.188436]  ? security_inode_mkdir+0xca/0x100
[  305.193006]  vfs_mkdir+0x463/0x6e0
[  305.196538]  SyS_mkdirat+0x1fd/0x270
[  305.200251]  ? SyS_mknod+0x30/0x30
[  305.203779]  ? fput_many+0xe/0x140
[  305.207316]  ? do_syscall_64+0x4c/0x640
[  305.211280]  ? SyS_mknod+0x30/0x30
[  305.214807]  do_syscall_64+0x1d5/0x640
[  305.218695]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  305.223873] RIP: 0033:0x7f5c30ced317
[  305.227576] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  305.235278] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30ced317
[  305.242965] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  305.250223] RBP: 00007f5c2f6631d0 R08: 0000000000000000 R09: 00007f5c2f6631d0
12:09:11 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/171, 0xab}], 0x1, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180))
ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000000)=0x2454400)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/171, 0xab}], 0x1, 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) (async)
ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000000)=0x2454400) (async)

12:09:11 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0)
io_setup(0x1, &(0x7f0000000100)=<r2=>0x0)
creat(&(0x7f0000000ac0)='./file1\x00', 0x41)
io_setup(0x8, &(0x7f0000000a80)=<r3=>0x0)
io_destroy(r3)
r4 = syz_mount_image$ubifs(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x10002e, 0x1, &(0x7f0000000400)=[{&(0x7f0000000340)="3a650fe96080a7f8865505bd4b6b9ba4c649409f77bdd83dd6bfa3791336c9b178b579ce0162377009a322362fd58fafdb03de2bafb272d5c6f80f387ebbb9722247d7135d5eb41aa341e0b7fb5d6c5dc3afa2803e0c1a7cd54629b9fd4449d60e9f21bdf4b546153efcda3d90bdaedeba3718b7d0d2f1996604debec017a14305890c3707692f2a55e89e26b367789a0ea77cde7e522696100c0ab7", 0x9c, 0x4}], 0x8000, &(0x7f0000000440)={[{@compr_zstd}, {@compr_lzo}, {@auth_hash_name={'auth_hash_name', 0x3d, 'md5'}}, {@compr_zlib}, {@no_bulk_read}, {@compr_none}, {@norm_unmount}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]})
r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0)
r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000640), 0x40000, 0x0)
r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x9, [@enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0x0, 0x10001}, {0x9, 0x1}, {0x9, 0xd4a}]}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @union={0x2, 0x3, 0x0, 0x5, 0x0, 0x1f, [{0x9, 0x0, 0x7fffffff}, {0x9, 0x1, 0x3}, {0x1, 0x0, 0x4}]}]}, {0x0, [0x30, 0x30, 0x61, 0x0, 0x0, 0x5f, 0x0]}}, &(0x7f0000000840)=""/33, 0x81, 0x21, 0x1}, 0x20)
io_submit(r2, 0x7, &(0x7f0000000a40)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x0, r1, &(0x7f0000000180)="162961caa661f4ae40ee647fb62a1c504701c52415ee6f108a472bd3edae35800408c8cabedce3cf1587776795cc0030db1e1be6e9b8f4062505a848187c6ba976e460530d03a019809498d9ed1a4bf53048f2098af0d335b282a8f6fb84d36dbf35369139a3a8677a86e779011a8e32fcd6fa6a1c8e675262aa7d065cdb1895288cd76285166e8c4245540835fc282265cbb0689370a56c37d9fb9ed4604212ea271c03af596d6761424ebc61153dba6b96f8107429777215648518e8fafea8b94caa0c5038f7919c753105bd321497a179d6259ec39caef87abb2317857839d8928121", 0xe4, 0x8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x3f, r4, &(0x7f00000004c0)="345e87dc519ce8b808174f1b4892754cddcaf52121fe3d56c6cbd6279c5864ef1e573e3c6d3f05b3", 0x28, 0x10000, 0x0, 0x1}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x6, 0x4, r5, &(0x7f0000000580)="18c5ecc9c972fc4d2801f15703dae6d8a9baa3cdf965d5e9f797b3a5a376aa4fe25b47efe86b2383d676bfc1a8f9192840fd4b213dcc1fcc2d90f90cd79000f747198843", 0x44, 0xffffffffffffffff, 0x0, 0x1, r1}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x3, r6, &(0x7f0000000680)="d102cdb781ebc876b51dc649add225b47313a50fb63bab2a5380f92fa7806af9ca4857de021594a8da4c82717828ad29ead598efd40933c7c5fdfbd39a049fb1837c727194ebaef8987b970904e2ae77014e30a4267ecda8e4d8200f492957fa65792b97879030c8095c553039db419f48c5c5ea469f91e8315a6cb5c4517a2c6880cb", 0x83, 0x3, 0x0, 0x1, r1}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x8, 0x2, r7, &(0x7f00000008c0)="87e2def1a97801633de46abc27687f0ef7535b46c4a2031b4c48a5f6a47d5b33b4a370719cc92558fc316d", 0x2b, 0xffff, 0x0, 0x3, r1}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x1, 0x39, r1, &(0x7f0000000940)="a574d318921e5a5e2ed781b8af44918af3c76d72c24849b76fbace368149e37cfe080b18ab321b159477d97a64bc", 0x2e, 0x4, 0x0, 0x2, r1}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x5, 0x4, r1, &(0x7f00000009c0)="d1baf27686261543fd6bd72bd21ad376c4b90947647f2dc6d09595a2a24698ba1d1b5c622c0d7e390aead199d5a57470d4646218", 0x34, 0xffff, 0x0, 0x0, r1}])
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0xff)

12:09:11 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 43)

12:09:11 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  305.257485] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  305.264738] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
[  305.321137] FAULT_INJECTION: forcing a failure.
[  305.321137] name failslab, interval 1, probability 0, space 0, times 0
[  305.332836] CPU: 0 PID: 18557 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  305.340729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  305.350081] Call Trace:
[  305.352670]  dump_stack+0x1b2/0x281
[  305.356304]  should_fail.cold+0x10a/0x149
[  305.360478]  should_failslab+0xd6/0x130
[  305.364456]  __kmalloc_track_caller+0x2bc/0x400
[  305.369126]  ? strndup_user+0x5b/0xf0
[  305.372940]  memdup_user+0x22/0xa0
[  305.376499]  strndup_user+0x5b/0xf0
[  305.380128]  ? copy_mnt_ns+0xa30/0xa30
[  305.384019]  SyS_mount+0x39/0x120
[  305.387471]  ? copy_mnt_ns+0xa30/0xa30
[  305.391356]  do_syscall_64+0x1d5/0x640
[  305.395251]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  305.400434] RIP: 0033:0x7faf49cac73a
[  305.404136] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  305.411840] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
12:09:11 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

12:09:11 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/171, 0xab}], 0x1, 0x0, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) (async)
ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000000)=0x2454400)

12:09:11 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 38)

12:09:11 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  305.419103] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  305.426358] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  305.433614] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  305.440881] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  305.492494] FAULT_INJECTION: forcing a failure.
[  305.492494] name failslab, interval 1, probability 0, space 0, times 0
[  305.525204] Unknown ioctl 1074275332
[  305.532917] CPU: 0 PID: 18580 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  305.540809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  305.550161] Call Trace:
[  305.552759]  dump_stack+0x1b2/0x281
[  305.556422]  should_fail.cold+0x10a/0x149
[  305.560577]  should_failslab+0xd6/0x130
[  305.564554]  __kmalloc+0x2c1/0x400
[  305.568120]  ? ext4_find_extent+0x879/0xbc0
[  305.572439]  ? check_preemption_disabled+0x35/0x240
[  305.577455]  ext4_find_extent+0x879/0xbc0
[  305.581609]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  305.587060]  ext4_ext_map_blocks+0x19a/0x6b10
[  305.591558]  ? __lock_acquire+0x5fc/0x3f20
[  305.595798]  ? __lock_acquire+0x5fc/0x3f20
[  305.600126]  ? check_preemption_disabled+0x35/0x240
[  305.605159]  ? perf_trace_lock+0xf7/0x490
[  305.609308]  ? ext4_find_delalloc_cluster+0x180/0x180
[  305.614516]  ? trace_hardirqs_on+0x10/0x10
[  305.618737]  ? perf_trace_lock_acquire+0x510/0x510
[  305.623668]  ? ext4_es_lookup_extent+0x321/0xac0
[  305.628406]  ? lock_acquire+0x170/0x3f0
[  305.632380]  ? lock_acquire+0x170/0x3f0
[  305.636340]  ? ext4_map_blocks+0x29f/0x1730
[  305.640647]  ext4_map_blocks+0xb19/0x1730
[  305.644784]  ? ext4_issue_zeroout+0x150/0x150
[  305.649259]  ? __ext4_new_inode+0x27c/0x4eb0
[  305.653668]  ext4_getblk+0x98/0x3f0
[  305.659275]  ? ext4_iomap_begin+0x7f0/0x7f0
[  305.663587]  ext4_bread+0x6c/0x1a0
[  305.667108]  ? ext4_getblk+0x3f0/0x3f0
[  305.670976]  ? dquot_initialize_needed+0x240/0x240
[  305.675890]  ext4_append+0x143/0x350
[  305.679589]  ext4_mkdir+0x4c9/0xbd0
[  305.683205]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  305.687860]  ? security_inode_mkdir+0xca/0x100
[  305.692425]  vfs_mkdir+0x463/0x6e0
[  305.695951]  SyS_mkdirat+0x1fd/0x270
[  305.699648]  ? SyS_mknod+0x30/0x30
[  305.703169]  ? fput_many+0xe/0x140
[  305.706690]  ? do_syscall_64+0x4c/0x640
[  305.710643]  ? SyS_mknod+0x30/0x30
[  305.714165]  do_syscall_64+0x1d5/0x640
[  305.718039]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  305.723210] RIP: 0033:0x7f5c30ced317
[  305.726902] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  305.734595] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30ced317
12:09:12 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
read(r1, &(0x7f0000000140)=""/87, 0x57)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
read(r1, &(0x7f0000000140)=""/87, 0x57) (async)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) (async)

12:09:12 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 44)

12:09:12 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/160, 0xa0}], 0x1, 0x100, 0x0)

12:09:12 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  305.741848] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  305.749098] RBP: 00007f5c2f6631d0 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  305.756346] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  305.763593] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
12:09:12 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) (async)
io_setup(0x1, &(0x7f0000000100)=<r2=>0x0) (async)
creat(&(0x7f0000000ac0)='./file1\x00', 0x41) (async)
io_setup(0x8, &(0x7f0000000a80)=<r3=>0x0)
io_destroy(r3) (async)
r4 = syz_mount_image$ubifs(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x10002e, 0x1, &(0x7f0000000400)=[{&(0x7f0000000340)="3a650fe96080a7f8865505bd4b6b9ba4c649409f77bdd83dd6bfa3791336c9b178b579ce0162377009a322362fd58fafdb03de2bafb272d5c6f80f387ebbb9722247d7135d5eb41aa341e0b7fb5d6c5dc3afa2803e0c1a7cd54629b9fd4449d60e9f21bdf4b546153efcda3d90bdaedeba3718b7d0d2f1996604debec017a14305890c3707692f2a55e89e26b367789a0ea77cde7e522696100c0ab7", 0x9c, 0x4}], 0x8000, &(0x7f0000000440)={[{@compr_zstd}, {@compr_lzo}, {@auth_hash_name={'auth_hash_name', 0x3d, 'md5'}}, {@compr_zlib}, {@no_bulk_read}, {@compr_none}, {@norm_unmount}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) (async)
r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) (async)
r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000640), 0x40000, 0x0)
r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x9, [@enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0x0, 0x10001}, {0x9, 0x1}, {0x9, 0xd4a}]}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @union={0x2, 0x3, 0x0, 0x5, 0x0, 0x1f, [{0x9, 0x0, 0x7fffffff}, {0x9, 0x1, 0x3}, {0x1, 0x0, 0x4}]}]}, {0x0, [0x30, 0x30, 0x61, 0x0, 0x0, 0x5f, 0x0]}}, &(0x7f0000000840)=""/33, 0x81, 0x21, 0x1}, 0x20)
io_submit(r2, 0x7, &(0x7f0000000a40)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x0, r1, &(0x7f0000000180)="162961caa661f4ae40ee647fb62a1c504701c52415ee6f108a472bd3edae35800408c8cabedce3cf1587776795cc0030db1e1be6e9b8f4062505a848187c6ba976e460530d03a019809498d9ed1a4bf53048f2098af0d335b282a8f6fb84d36dbf35369139a3a8677a86e779011a8e32fcd6fa6a1c8e675262aa7d065cdb1895288cd76285166e8c4245540835fc282265cbb0689370a56c37d9fb9ed4604212ea271c03af596d6761424ebc61153dba6b96f8107429777215648518e8fafea8b94caa0c5038f7919c753105bd321497a179d6259ec39caef87abb2317857839d8928121", 0xe4, 0x8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x3f, r4, &(0x7f00000004c0)="345e87dc519ce8b808174f1b4892754cddcaf52121fe3d56c6cbd6279c5864ef1e573e3c6d3f05b3", 0x28, 0x10000, 0x0, 0x1}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x6, 0x4, r5, &(0x7f0000000580)="18c5ecc9c972fc4d2801f15703dae6d8a9baa3cdf965d5e9f797b3a5a376aa4fe25b47efe86b2383d676bfc1a8f9192840fd4b213dcc1fcc2d90f90cd79000f747198843", 0x44, 0xffffffffffffffff, 0x0, 0x1, r1}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x3, r6, &(0x7f0000000680)="d102cdb781ebc876b51dc649add225b47313a50fb63bab2a5380f92fa7806af9ca4857de021594a8da4c82717828ad29ead598efd40933c7c5fdfbd39a049fb1837c727194ebaef8987b970904e2ae77014e30a4267ecda8e4d8200f492957fa65792b97879030c8095c553039db419f48c5c5ea469f91e8315a6cb5c4517a2c6880cb", 0x83, 0x3, 0x0, 0x1, r1}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x8, 0x2, r7, &(0x7f00000008c0)="87e2def1a97801633de46abc27687f0ef7535b46c4a2031b4c48a5f6a47d5b33b4a370719cc92558fc316d", 0x2b, 0xffff, 0x0, 0x3, r1}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x1, 0x39, r1, &(0x7f0000000940)="a574d318921e5a5e2ed781b8af44918af3c76d72c24849b76fbace368149e37cfe080b18ab321b159477d97a64bc", 0x2e, 0x4, 0x0, 0x2, r1}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x5, 0x4, r1, &(0x7f00000009c0)="d1baf27686261543fd6bd72bd21ad376c4b90947647f2dc6d09595a2a24698ba1d1b5c622c0d7e390aead199d5a57470d4646218", 0x34, 0xffff, 0x0, 0x0, r1}]) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0xff)

[  305.818193] vxfs: WRONG superblock magic 00000000 at 1
12:09:12 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  305.839995] FAULT_INJECTION: forcing a failure.
[  305.839995] name failslab, interval 1, probability 0, space 0, times 0
[  305.848458] vxfs: WRONG superblock magic 00000000 at 8
[  305.870857] vxfs: can't find superblock.
[  305.876106] CPU: 1 PID: 18605 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
12:09:12 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  305.883996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  305.893347] Call Trace:
[  305.895935]  dump_stack+0x1b2/0x281
[  305.899587]  should_fail.cold+0x10a/0x149
[  305.900030] Unknown ioctl 1074275332
[  305.903738]  should_failslab+0xd6/0x130
[  305.903752]  __kmalloc_track_caller+0x2bc/0x400
[  305.903763]  ? strndup_user+0x5b/0xf0
[  305.903776]  memdup_user+0x22/0xa0
[  305.903786]  strndup_user+0x5b/0xf0
[  305.903794]  ? copy_mnt_ns+0xa30/0xa30
[  305.903804]  SyS_mount+0x39/0x120
[  305.903811]  ? copy_mnt_ns+0xa30/0xa30
12:09:12 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:09:12 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:09:12 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  305.903824]  do_syscall_64+0x1d5/0x640
[  305.942109]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  305.947291] RIP: 0033:0x7faf49cac73a
[  305.950986] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  305.958696] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  305.965962] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  305.973235] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  305.980505] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  305.987776] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
12:09:12 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 39)

12:09:12 executing program 5:
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00')

[  306.088498] FAULT_INJECTION: forcing a failure.
[  306.088498] name failslab, interval 1, probability 0, space 0, times 0
[  306.114519] CPU: 1 PID: 18646 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  306.122504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  306.132025] Call Trace:
[  306.134617]  dump_stack+0x1b2/0x281
[  306.138249]  should_fail.cold+0x10a/0x149
[  306.142427]  should_failslab+0xd6/0x130
[  306.146476]  kmem_cache_alloc+0x28e/0x3c0
[  306.150616]  ? ext4_sync_fs+0x7e0/0x7e0
[  306.154622]  ext4_alloc_inode+0x1a/0x640
[  306.158755]  ? ext4_sync_fs+0x7e0/0x7e0
[  306.162716]  alloc_inode+0x5d/0x170
[  306.166322]  new_inode+0x1d/0xf0
[  306.169675]  __ext4_new_inode+0x360/0x4eb0
[  306.173891]  ? kmem_cache_free+0x7c/0x2b0
[  306.178019]  ? putname+0xcd/0x110
[  306.181451]  ? SyS_mkdirat+0x95/0x270
[  306.185317]  ? entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  306.190688]  ? ext4_free_inode+0x1460/0x1460
[  306.195073]  ? lock_downgrade+0x740/0x740
[  306.199202]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[  306.204292]  ? dquot_initialize_needed+0x240/0x240
[  306.209211]  ext4_mkdir+0x2e4/0xbd0
[  306.212826]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  306.217917]  ? security_inode_mkdir+0xca/0x100
[  306.222498]  vfs_mkdir+0x463/0x6e0
[  306.226022]  SyS_mkdirat+0x1fd/0x270
[  306.229738]  ? SyS_mknod+0x30/0x30
[  306.233266]  ? fput_many+0xe/0x140
[  306.236798]  ? do_syscall_64+0x4c/0x640
[  306.240752]  ? SyS_mknod+0x30/0x30
[  306.244273]  do_syscall_64+0x1d5/0x640
[  306.248156]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  306.253327] RIP: 0033:0x7f5c30ced317
[  306.257015] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  306.264703] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30ced317
[  306.271948] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  306.279199] RBP: 00007f5c2f6631d0 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  306.286446] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  306.293695] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
12:09:13 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)
read(r1, &(0x7f0000000140)=""/87, 0x57)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
read(r1, &(0x7f0000000140)=""/87, 0x57) (async)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) (async)

12:09:13 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 45)

[  306.694723] FAULT_INJECTION: forcing a failure.
[  306.694723] name failslab, interval 1, probability 0, space 0, times 0
[  306.705980] CPU: 0 PID: 18657 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  306.713856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  306.723209] Call Trace:
[  306.725786]  dump_stack+0x1b2/0x281
[  306.729488]  should_fail.cold+0x10a/0x149
[  306.733641]  should_failslab+0xd6/0x130
[  306.737600]  kmem_cache_alloc+0x40/0x3c0
[  306.741649]  __es_insert_extent+0x338/0x1360
[  306.746052]  ext4_es_insert_extent+0x1b9/0x530
[  306.750648]  ? ext4_es_find_delayed_extent_range+0x930/0x930
[  306.756491]  ext4_map_blocks+0x887/0x1730
[  306.760650]  ? ext4_issue_zeroout+0x150/0x150
[  306.765128]  ? __ext4_new_inode+0x27c/0x4eb0
[  306.769535]  ext4_getblk+0x98/0x3f0
[  306.773246]  ? ext4_iomap_begin+0x7f0/0x7f0
[  306.777560]  ext4_bread+0x6c/0x1a0
[  306.781085]  ? ext4_getblk+0x3f0/0x3f0
[  306.784958]  ? dquot_initialize_needed+0x240/0x240
[  306.789878]  ext4_append+0x143/0x350
[  306.793587]  ext4_mkdir+0x4c9/0xbd0
[  306.797208]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  306.801876]  ? security_inode_mkdir+0xca/0x100
[  306.806450]  vfs_mkdir+0x463/0x6e0
[  306.809979]  SyS_mkdirat+0x1fd/0x270
[  306.813680]  ? SyS_mknod+0x30/0x30
[  306.817204]  ? fput_many+0xe/0x140
[  306.820730]  ? do_syscall_64+0x4c/0x640
[  306.824687]  ? SyS_mknod+0x30/0x30
[  306.828211]  do_syscall_64+0x1d5/0x640
[  306.832099]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  306.837277] RIP: 0033:0x7faf49caa317
12:09:13 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/160, 0xa0}], 0x1, 0x100, 0x0)

12:09:13 executing program 5:
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00')

12:09:13 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) (async)
io_setup(0x1, &(0x7f0000000100)=<r2=>0x0) (async)
creat(&(0x7f0000000ac0)='./file1\x00', 0x41) (async)
io_setup(0x8, &(0x7f0000000a80)=<r3=>0x0)
io_destroy(r3) (async)
r4 = syz_mount_image$ubifs(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x10002e, 0x1, &(0x7f0000000400)=[{&(0x7f0000000340)="3a650fe96080a7f8865505bd4b6b9ba4c649409f77bdd83dd6bfa3791336c9b178b579ce0162377009a322362fd58fafdb03de2bafb272d5c6f80f387ebbb9722247d7135d5eb41aa341e0b7fb5d6c5dc3afa2803e0c1a7cd54629b9fd4449d60e9f21bdf4b546153efcda3d90bdaedeba3718b7d0d2f1996604debec017a14305890c3707692f2a55e89e26b367789a0ea77cde7e522696100c0ab7", 0x9c, 0x4}], 0x8000, &(0x7f0000000440)={[{@compr_zstd}, {@compr_lzo}, {@auth_hash_name={'auth_hash_name', 0x3d, 'md5'}}, {@compr_zlib}, {@no_bulk_read}, {@compr_none}, {@norm_unmount}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) (async)
r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0)
r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000640), 0x40000, 0x0)
r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x9, [@enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0x0, 0x10001}, {0x9, 0x1}, {0x9, 0xd4a}]}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @union={0x2, 0x3, 0x0, 0x5, 0x0, 0x1f, [{0x9, 0x0, 0x7fffffff}, {0x9, 0x1, 0x3}, {0x1, 0x0, 0x4}]}]}, {0x0, [0x30, 0x30, 0x61, 0x0, 0x0, 0x5f, 0x0]}}, &(0x7f0000000840)=""/33, 0x81, 0x21, 0x1}, 0x20)
io_submit(r2, 0x7, &(0x7f0000000a40)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x0, r1, &(0x7f0000000180)="162961caa661f4ae40ee647fb62a1c504701c52415ee6f108a472bd3edae35800408c8cabedce3cf1587776795cc0030db1e1be6e9b8f4062505a848187c6ba976e460530d03a019809498d9ed1a4bf53048f2098af0d335b282a8f6fb84d36dbf35369139a3a8677a86e779011a8e32fcd6fa6a1c8e675262aa7d065cdb1895288cd76285166e8c4245540835fc282265cbb0689370a56c37d9fb9ed4604212ea271c03af596d6761424ebc61153dba6b96f8107429777215648518e8fafea8b94caa0c5038f7919c753105bd321497a179d6259ec39caef87abb2317857839d8928121", 0xe4, 0x8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x3f, r4, &(0x7f00000004c0)="345e87dc519ce8b808174f1b4892754cddcaf52121fe3d56c6cbd6279c5864ef1e573e3c6d3f05b3", 0x28, 0x10000, 0x0, 0x1}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x6, 0x4, r5, &(0x7f0000000580)="18c5ecc9c972fc4d2801f15703dae6d8a9baa3cdf965d5e9f797b3a5a376aa4fe25b47efe86b2383d676bfc1a8f9192840fd4b213dcc1fcc2d90f90cd79000f747198843", 0x44, 0xffffffffffffffff, 0x0, 0x1, r1}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x3, r6, &(0x7f0000000680)="d102cdb781ebc876b51dc649add225b47313a50fb63bab2a5380f92fa7806af9ca4857de021594a8da4c82717828ad29ead598efd40933c7c5fdfbd39a049fb1837c727194ebaef8987b970904e2ae77014e30a4267ecda8e4d8200f492957fa65792b97879030c8095c553039db419f48c5c5ea469f91e8315a6cb5c4517a2c6880cb", 0x83, 0x3, 0x0, 0x1, r1}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x8, 0x2, r7, &(0x7f00000008c0)="87e2def1a97801633de46abc27687f0ef7535b46c4a2031b4c48a5f6a47d5b33b4a370719cc92558fc316d", 0x2b, 0xffff, 0x0, 0x3, r1}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x1, 0x39, r1, &(0x7f0000000940)="a574d318921e5a5e2ed781b8af44918af3c76d72c24849b76fbace368149e37cfe080b18ab321b159477d97a64bc", 0x2e, 0x4, 0x0, 0x2, r1}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x5, 0x4, r1, &(0x7f00000009c0)="d1baf27686261543fd6bd72bd21ad376c4b90947647f2dc6d09595a2a24698ba1d1b5c622c0d7e390aead199d5a57470d4646218", 0x34, 0xffff, 0x0, 0x0, r1}])
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0xff)

12:09:13 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 40)

[  306.840968] RSP: 002b:00007faf4861ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  306.848659] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49caa317
[  306.855909] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  306.863160] RBP: 00007faf486201d0 R08: 0000000000000000 R09: 00007faf486201d0
[  306.870429] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  306.877721] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  306.931864] Unknown ioctl 1074275332
[  306.939117] vxfs: WRONG superblock magic 00000000 at 1
[  306.951765] vxfs: WRONG superblock magic 00000000 at 8
[  306.972312] vxfs: can't find superblock.
[  306.986328] FAULT_INJECTION: forcing a failure.
[  306.986328] name failslab, interval 1, probability 0, space 0, times 0
[  306.997738] CPU: 0 PID: 18685 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  307.005668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  307.015018] Call Trace:
[  307.017596]  dump_stack+0x1b2/0x281
[  307.021212]  should_fail.cold+0x10a/0x149
[  307.025347]  should_failslab+0xd6/0x130
[  307.029305]  kmem_cache_alloc+0x40/0x3c0
[  307.033370]  __es_insert_extent+0x338/0x1360
[  307.037760]  ? __es_shrink+0x8c0/0x8c0
[  307.041633]  ? lock_acquire+0x170/0x3f0
[  307.045598]  ? ext4_es_insert_extent+0x11f/0x530
[  307.050360]  ext4_es_insert_extent+0x1b9/0x530
[  307.054954]  ? ext4_es_find_delayed_extent_range+0x930/0x930
[  307.060852]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  307.066303]  ? ext4_es_find_delayed_extent_range+0x646/0x930
[  307.072086]  ext4_ext_map_blocks+0x1e2c/0x6b10
[  307.076653]  ? __lock_acquire+0x5fc/0x3f20
[  307.080886]  ? __lock_acquire+0x5fc/0x3f20
[  307.085116]  ? native_iret+0x7/0x7
[  307.088641]  ? error_exit+0xb/0x20
[  307.092166]  ? ext4_find_delalloc_cluster+0x180/0x180
[  307.097347]  ? trace_hardirqs_on+0x10/0x10
[  307.101569]  ? lock_release+0x149/0x870
[  307.105535]  ? ext4_es_lookup_extent+0x321/0xac0
[  307.110276]  ? lock_acquire+0x170/0x3f0
[  307.114235]  ? lock_acquire+0x170/0x3f0
[  307.118190]  ? ext4_map_blocks+0x29f/0x1730
[  307.122510]  ext4_map_blocks+0xb19/0x1730
[  307.126647]  ? ext4_issue_zeroout+0x150/0x150
[  307.131126]  ? __ext4_new_inode+0x27c/0x4eb0
[  307.135527]  ext4_getblk+0x98/0x3f0
[  307.139136]  ? ext4_iomap_begin+0x7f0/0x7f0
[  307.143451]  ext4_bread+0x6c/0x1a0
[  307.146974]  ? ext4_getblk+0x3f0/0x3f0
[  307.150844]  ? dquot_initialize_needed+0x240/0x240
[  307.155758]  ext4_append+0x143/0x350
[  307.159471]  ext4_mkdir+0x4c9/0xbd0
[  307.163096]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  307.167755]  ? security_inode_mkdir+0xca/0x100
[  307.172329]  vfs_mkdir+0x463/0x6e0
[  307.175860]  SyS_mkdirat+0x1fd/0x270
[  307.179576]  ? SyS_mknod+0x30/0x30
[  307.183111]  ? fput_many+0xe/0x140
[  307.186738]  ? do_syscall_64+0x4c/0x640
[  307.190704]  ? SyS_mknod+0x30/0x30
[  307.194236]  do_syscall_64+0x1d5/0x640
[  307.198208]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  307.203383] RIP: 0033:0x7f5c30ced317
[  307.207074] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  307.214765] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30ced317
12:09:13 executing program 5:
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00')
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') (async)

12:09:13 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = gettid()
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r0, 0xa, r1, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r0, 0x8, 0xffffffffffffffff, 0x9)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x1, 0x4, 0x0, 0x5, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x208, 0x0, 0x4, 0x8, 0x81, 0xfffffbff, 0x4, 0x0, 0x3, 0x0, 0x7}, r0, 0x0, r2, 0x2)
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  307.222019] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  307.229273] RBP: 00007f5c2f6631d0 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  307.236526] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  307.243779] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
[  307.253527] vxfs: WRONG superblock magic 00000000 at 1
[  307.259097] vxfs: WRONG superblock magic 00000000 at 8
[  307.267620] vxfs: can't find superblock.
12:09:13 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 46)

12:09:13 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 41)

12:09:13 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = gettid()
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r0, 0xa, r1, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r0, 0x8, 0xffffffffffffffff, 0x9)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x1, 0x4, 0x0, 0x5, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x208, 0x0, 0x4, 0x8, 0x81, 0xfffffbff, 0x4, 0x0, 0x3, 0x0, 0x7}, r0, 0x0, r2, 0x2)
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  307.337161] FAULT_INJECTION: forcing a failure.
[  307.337161] name failslab, interval 1, probability 0, space 0, times 0
[  307.349867] CPU: 0 PID: 18700 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  307.357762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  307.367117] Call Trace:
[  307.369708]  dump_stack+0x1b2/0x281
[  307.373343]  should_fail.cold+0x10a/0x149
[  307.377501]  should_failslab+0xd6/0x130
[  307.381480]  kmem_cache_alloc_trace+0x29a/0x3d0
[  307.386150]  ? copy_mnt_ns+0xa30/0xa30
[  307.390050]  copy_mount_options+0x59/0x2f0
[  307.394292]  ? copy_mnt_ns+0xa30/0xa30
[  307.398184]  SyS_mount+0x84/0x120
[  307.401647]  ? copy_mnt_ns+0xa30/0xa30
[  307.405539]  do_syscall_64+0x1d5/0x640
[  307.409436]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  307.414622] RIP: 0033:0x7faf49cac73a
[  307.418330] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  307.426045] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
12:09:13 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x60c2, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f00000000c0)=0x4)
r3 = dup2(r2, r2)
ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_FD(0xffffffffffffffff, 0xc01064c1, &(0x7f0000000240)={0x0, 0x0, <r4=>0xffffffffffffffff})
r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340), 0x505281, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180))
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000180))
ioctl$SNDCTL_DSP_SYNC(r7, 0x5001, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r6, 0xc004500a, &(0x7f0000000740)=0x3a)
r8 = socket$packet(0x11, 0x3, 0x300)
r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600), 0x200000, 0x0)
io_submit(r1, 0x6, &(0x7f0000000700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x4, r0, &(0x7f0000000180)="e6ce88bdd69cfb50679d0a1445e1d8a95c5a53d0d530e7014e4820f8cc4c3d369a1ecc9cf988216d45ef23bf59eae1332ac68bf60e35fac280b5066e35b91018e3485f0fd924f03dfcd9ccf278dc93a6ba4bdf08a626de963efbcf65afe6228dc403e4bb376aa0357a7481688f9f8d130ccbab343743de122fa6b48be4355b74de20bb59038863e707f559d6ed5acb0dc4b89e26c66c4f45", 0x98, 0xffffffffffffffff, 0x0, 0x0, r3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x100, r4, &(0x7f0000000280)="2ecc755abbe4d1d8ea865be9869a7fb2a1bf41b9b52357ee04f96779fc34321bb40b598f3c21841727aec610d8a2c2262e59c28d3e91b0f32aa208c0b4c724d2b10da4ff79bad8ec317329e101c676d1e83c1a710e09ff274c69f1d3a4ba7affc026c88f69302c01406172aecadc878dbb9b25a04db20b5233669aab882141ab7ec9212aadde3d9ff485d39e7c138b32f9af031c77ed86e031c968d8d175da20bb86f0ddcc459e978fcf", 0xaa, 0x6, 0x0, 0x1, r5}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x2, 0x6, r8, &(0x7f00000003c0)="c0b142470485bcda910f0a318479ad516b04b2be48016bca7add8d4d4e2dc83f8a7caf74b8a8251f5d4557854b0bdefe1f700f1c6b1dc63253a79e534ccd0ffe3235ecfff4977ea0dd201b4914616abff36b421bec9f794a282f66c62669eeafda960da3ee820ddf98e5dc00aefdd4acb4398547c6e93fdc86b4a1531b91c9118438d0cbb921290446978ad0df661719e2d6176f0888", 0x96, 0x674, 0x0, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0xffff, r2, &(0x7f00000004c0)="bf4c75bec9750f05aef4f05266e41473226096fce18d76f3302125e052de5deee164897512e9a5064f33e490472ac1fef3103173c851a7c212e7674a3f3f78a281a9c28b2800a9cc7cee7b3cc99becc1b5bfbc68ae08c64a246d174c8aceb282d2e6233c87934c4f354d9b7f15746435fc6f7350953dc8d4e5559b9ae09bc35bbbb5dce8c442c67b23adc48386109f2ee15b2529908d4ea049b34f56f43f7049093b2795131d7c50f1c887c05af866f3ce629a2eaf766cf6f33b6b1dd744d6ee2e9d884dad7d1dddc70dec3e3851b20da76372a1", 0xd4, 0x100000001, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x8001, r9, &(0x7f0000001240)="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", 0x1000, 0xc98, 0x0, 0x2}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f0000000680)="c6bb8ed2c5b235cc8dc801a4c9119698699766b0c1cd52899afa74a8130bea5ead3bcddfc7d71f3b67cbe27e6ffa", 0x2e, 0x7, 0x0, 0x2}])
ftruncate(r2, 0x8000000000000000)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:13 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x3, 0x2, 0x1, 0x40, 0x0, 0x6, 0x80, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x20, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x40000, 0x1, 0x200, 0x2, 0x3, 0x3d, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x5, r0, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  307.433314] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  307.440584] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  307.447845] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  307.455109] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  307.476522] FAULT_INJECTION: forcing a failure.
[  307.476522] name failslab, interval 1, probability 0, space 0, times 0
12:09:13 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (rerun: 64)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x3, 0x2, 0x1, 0x40, 0x0, 0x6, 0x80, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x20, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x40000, 0x1, 0x200, 0x2, 0x3, 0x3d, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x5, r0, 0x0) (async, rerun: 32)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (rerun: 32)

[  307.529531] CPU: 1 PID: 18710 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  307.537439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  307.546791] Call Trace:
[  307.549384]  dump_stack+0x1b2/0x281
[  307.553018]  should_fail.cold+0x10a/0x149
[  307.557173]  should_failslab+0xd6/0x130
[  307.561138]  __kmalloc+0x2c1/0x400
[  307.564662]  ? ext4_find_extent+0x879/0xbc0
[  307.568972]  ext4_find_extent+0x879/0xbc0
[  307.573110]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  307.578548]  ext4_ext_map_blocks+0x19a/0x6b10
[  307.583036]  ? __lock_acquire+0x5fc/0x3f20
[  307.587262]  ? check_preemption_disabled+0x35/0x240
[  307.592276]  ? perf_trace_lock+0xf7/0x490
[  307.596410]  ? ext4_find_delalloc_cluster+0x180/0x180
[  307.601589]  ? perf_trace_lock+0xf7/0x490
[  307.605742]  ? perf_trace_lock_acquire+0x510/0x510
[  307.610653]  ? ext4_es_lookup_extent+0x321/0xac0
[  307.615399]  ? lock_acquire+0x170/0x3f0
[  307.619361]  ? lock_acquire+0x170/0x3f0
[  307.623322]  ? ext4_map_blocks+0x623/0x1730
[  307.627656]  ext4_map_blocks+0x675/0x1730
[  307.631800]  ? ext4_issue_zeroout+0x150/0x150
[  307.636281]  ? __ext4_new_inode+0x27c/0x4eb0
[  307.640688]  ext4_getblk+0x98/0x3f0
[  307.644301]  ? ext4_iomap_begin+0x7f0/0x7f0
[  307.648617]  ext4_bread+0x6c/0x1a0
[  307.652156]  ? ext4_getblk+0x3f0/0x3f0
[  307.656029]  ? dquot_initialize_needed+0x240/0x240
[  307.660947]  ext4_append+0x143/0x350
[  307.664648]  ext4_mkdir+0x4c9/0xbd0
[  307.668273]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  307.672932]  ? security_inode_mkdir+0xca/0x100
[  307.677500]  vfs_mkdir+0x463/0x6e0
[  307.681027]  SyS_mkdirat+0x1fd/0x270
[  307.684726]  ? SyS_mknod+0x30/0x30
[  307.688253]  ? fput_many+0xe/0x140
[  307.691778]  ? do_syscall_64+0x4c/0x640
[  307.695740]  ? SyS_mknod+0x30/0x30
[  307.699269]  do_syscall_64+0x1d5/0x640
[  307.703151]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  307.708326] RIP: 0033:0x7f5c30ced317
[  307.712019] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  307.719728] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30ced317
12:09:14 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/160, 0xa0}], 0x1, 0x100, 0x0)

12:09:14 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = gettid()
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r0, 0xa, r1, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r0, 0x8, 0xffffffffffffffff, 0x9)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000140))
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x1, 0x4, 0x0, 0x5, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x208, 0x0, 0x4, 0x8, 0x81, 0xfffffbff, 0x4, 0x0, 0x3, 0x0, 0x7}, r0, 0x0, r2, 0x2)
r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
gettid() (async)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async)
perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r0, 0xa, r1, 0xb) (async)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r0, 0x8, 0xffffffffffffffff, 0x9) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x1, 0x4, 0x0, 0x5, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x208, 0x0, 0x4, 0x8, 0x81, 0xfffffbff, 0x4, 0x0, 0x3, 0x0, 0x7}, r0, 0x0, r2, 0x2) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

12:09:14 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 47)

[  307.726995] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  307.734249] RBP: 00007f5c2f6631d0 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  307.741501] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  307.748752] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
12:09:14 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0) (async, rerun: 32)
r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x60c2, 0x0) (rerun: 32)
ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f00000000c0)=0x4) (async)
r3 = dup2(r2, r2) (async)
ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_FD(0xffffffffffffffff, 0xc01064c1, &(0x7f0000000240)={0x0, 0x0, <r4=>0xffffffffffffffff}) (async)
r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340), 0x505281, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180))
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000180)) (async)
ioctl$SNDCTL_DSP_SYNC(r7, 0x5001, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r6, 0xc004500a, &(0x7f0000000740)=0x3a) (async)
r8 = socket$packet(0x11, 0x3, 0x300) (async)
r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600), 0x200000, 0x0)
io_submit(r1, 0x6, &(0x7f0000000700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x4, r0, &(0x7f0000000180)="e6ce88bdd69cfb50679d0a1445e1d8a95c5a53d0d530e7014e4820f8cc4c3d369a1ecc9cf988216d45ef23bf59eae1332ac68bf60e35fac280b5066e35b91018e3485f0fd924f03dfcd9ccf278dc93a6ba4bdf08a626de963efbcf65afe6228dc403e4bb376aa0357a7481688f9f8d130ccbab343743de122fa6b48be4355b74de20bb59038863e707f559d6ed5acb0dc4b89e26c66c4f45", 0x98, 0xffffffffffffffff, 0x0, 0x0, r3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x100, r4, &(0x7f0000000280)="2ecc755abbe4d1d8ea865be9869a7fb2a1bf41b9b52357ee04f96779fc34321bb40b598f3c21841727aec610d8a2c2262e59c28d3e91b0f32aa208c0b4c724d2b10da4ff79bad8ec317329e101c676d1e83c1a710e09ff274c69f1d3a4ba7affc026c88f69302c01406172aecadc878dbb9b25a04db20b5233669aab882141ab7ec9212aadde3d9ff485d39e7c138b32f9af031c77ed86e031c968d8d175da20bb86f0ddcc459e978fcf", 0xaa, 0x6, 0x0, 0x1, r5}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x2, 0x6, r8, &(0x7f00000003c0)="c0b142470485bcda910f0a318479ad516b04b2be48016bca7add8d4d4e2dc83f8a7caf74b8a8251f5d4557854b0bdefe1f700f1c6b1dc63253a79e534ccd0ffe3235ecfff4977ea0dd201b4914616abff36b421bec9f794a282f66c62669eeafda960da3ee820ddf98e5dc00aefdd4acb4398547c6e93fdc86b4a1531b91c9118438d0cbb921290446978ad0df661719e2d6176f0888", 0x96, 0x674, 0x0, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0xffff, r2, &(0x7f00000004c0)="bf4c75bec9750f05aef4f05266e41473226096fce18d76f3302125e052de5deee164897512e9a5064f33e490472ac1fef3103173c851a7c212e7674a3f3f78a281a9c28b2800a9cc7cee7b3cc99becc1b5bfbc68ae08c64a246d174c8aceb282d2e6233c87934c4f354d9b7f15746435fc6f7350953dc8d4e5559b9ae09bc35bbbb5dce8c442c67b23adc48386109f2ee15b2529908d4ea049b34f56f43f7049093b2795131d7c50f1c887c05af866f3ce629a2eaf766cf6f33b6b1dd744d6ee2e9d884dad7d1dddc70dec3e3851b20da76372a1", 0xd4, 0x100000001, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x8001, r9, &(0x7f0000001240)="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", 0x1000, 0xc98, 0x0, 0x2}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f0000000680)="c6bb8ed2c5b235cc8dc801a4c9119698699766b0c1cd52899afa74a8130bea5ead3bcddfc7d71f3b67cbe27e6ffa", 0x2e, 0x7, 0x0, 0x2}]) (async, rerun: 64)
ftruncate(r2, 0x8000000000000000) (async, rerun: 64)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:14 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x3, 0x2, 0x1, 0x40, 0x0, 0x6, 0x80, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x20, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x40000, 0x1, 0x200, 0x2, 0x3, 0x3d, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x5, r0, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  307.887100] FAULT_INJECTION: forcing a failure.
[  307.887100] name failslab, interval 1, probability 0, space 0, times 0
[  307.972136] CPU: 1 PID: 18734 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  307.980043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  307.989397] Call Trace:
[  307.991989]  dump_stack+0x1b2/0x281
[  307.995629]  should_fail.cold+0x10a/0x149
[  307.999787]  should_failslab+0xd6/0x130
[  308.003800]  kmem_cache_alloc+0x28e/0x3c0
[  308.007944]  alloc_vfsmnt+0x23/0x7f0
[  308.011671]  ? _raw_read_unlock+0x29/0x40
[  308.015853]  vfs_kern_mount.part.0+0x27/0x470
[  308.020356]  do_mount+0xe65/0x2a30
[  308.023894]  ? __do_page_fault+0x159/0xad0
[  308.028123]  ? retint_kernel+0x2d/0x2d
[  308.032016]  ? copy_mount_string+0x40/0x40
[  308.036250]  ? memset+0x20/0x40
[  308.039529]  ? copy_mount_options+0x1fa/0x2f0
[  308.044022]  ? copy_mnt_ns+0xa30/0xa30
[  308.047908]  SyS_mount+0xa8/0x120
[  308.051356]  ? copy_mnt_ns+0xa30/0xa30
[  308.055243]  do_syscall_64+0x1d5/0x640
[  308.059131]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  308.064329] RIP: 0033:0x7faf49cac73a
12:09:14 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x101081, 0x0)
ioctl$SNDCTL_DSP_GETOSPACE(r1, 0x8010500c, &(0x7f00000000c0))
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0)

12:09:14 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x60c2, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f00000000c0)=0x4)
r3 = dup2(r2, r2)
ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_FD(0xffffffffffffffff, 0xc01064c1, &(0x7f0000000240)={0x0, 0x0, <r4=>0xffffffffffffffff})
r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340), 0x505281, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180))
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000180))
ioctl$SNDCTL_DSP_SYNC(r7, 0x5001, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r6, 0xc004500a, &(0x7f0000000740)=0x3a)
r8 = socket$packet(0x11, 0x3, 0x300)
r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600), 0x200000, 0x0)
io_submit(r1, 0x6, &(0x7f0000000700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x4, r0, &(0x7f0000000180)="e6ce88bdd69cfb50679d0a1445e1d8a95c5a53d0d530e7014e4820f8cc4c3d369a1ecc9cf988216d45ef23bf59eae1332ac68bf60e35fac280b5066e35b91018e3485f0fd924f03dfcd9ccf278dc93a6ba4bdf08a626de963efbcf65afe6228dc403e4bb376aa0357a7481688f9f8d130ccbab343743de122fa6b48be4355b74de20bb59038863e707f559d6ed5acb0dc4b89e26c66c4f45", 0x98, 0xffffffffffffffff, 0x0, 0x0, r3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x100, r4, &(0x7f0000000280)="2ecc755abbe4d1d8ea865be9869a7fb2a1bf41b9b52357ee04f96779fc34321bb40b598f3c21841727aec610d8a2c2262e59c28d3e91b0f32aa208c0b4c724d2b10da4ff79bad8ec317329e101c676d1e83c1a710e09ff274c69f1d3a4ba7affc026c88f69302c01406172aecadc878dbb9b25a04db20b5233669aab882141ab7ec9212aadde3d9ff485d39e7c138b32f9af031c77ed86e031c968d8d175da20bb86f0ddcc459e978fcf", 0xaa, 0x6, 0x0, 0x1, r5}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x2, 0x6, r8, &(0x7f00000003c0)="c0b142470485bcda910f0a318479ad516b04b2be48016bca7add8d4d4e2dc83f8a7caf74b8a8251f5d4557854b0bdefe1f700f1c6b1dc63253a79e534ccd0ffe3235ecfff4977ea0dd201b4914616abff36b421bec9f794a282f66c62669eeafda960da3ee820ddf98e5dc00aefdd4acb4398547c6e93fdc86b4a1531b91c9118438d0cbb921290446978ad0df661719e2d6176f0888", 0x96, 0x674, 0x0, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0xffff, r2, &(0x7f00000004c0)="bf4c75bec9750f05aef4f05266e41473226096fce18d76f3302125e052de5deee164897512e9a5064f33e490472ac1fef3103173c851a7c212e7674a3f3f78a281a9c28b2800a9cc7cee7b3cc99becc1b5bfbc68ae08c64a246d174c8aceb282d2e6233c87934c4f354d9b7f15746435fc6f7350953dc8d4e5559b9ae09bc35bbbb5dce8c442c67b23adc48386109f2ee15b2529908d4ea049b34f56f43f7049093b2795131d7c50f1c887c05af866f3ce629a2eaf766cf6f33b6b1dd744d6ee2e9d884dad7d1dddc70dec3e3851b20da76372a1", 0xd4, 0x100000001, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x8001, r9, &(0x7f0000001240)="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", 0x1000, 0xc98, 0x0, 0x2}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f0000000680)="c6bb8ed2c5b235cc8dc801a4c9119698699766b0c1cd52899afa74a8130bea5ead3bcddfc7d71f3b67cbe27e6ffa", 0x2e, 0x7, 0x0, 0x2}])
ftruncate(r2, 0x8000000000000000)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x60c2, 0x0) (async)
ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f00000000c0)=0x4) (async)
dup2(r2, r2) (async)
ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_FD(0xffffffffffffffff, 0xc01064c1, &(0x7f0000000240)) (async)
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340), 0x505281, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180)) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000180)) (async)
ioctl$SNDCTL_DSP_SYNC(r7, 0x5001, 0x0) (async)
ioctl$SNDCTL_DSP_SETFRAGMENT(r6, 0xc004500a, &(0x7f0000000740)=0x3a) (async)
socket$packet(0x11, 0x3, 0x300) (async)
openat$audio(0xffffffffffffff9c, &(0x7f0000000600), 0x200000, 0x0) (async)
io_submit(r1, 0x6, &(0x7f0000000700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x4, r0, &(0x7f0000000180)="e6ce88bdd69cfb50679d0a1445e1d8a95c5a53d0d530e7014e4820f8cc4c3d369a1ecc9cf988216d45ef23bf59eae1332ac68bf60e35fac280b5066e35b91018e3485f0fd924f03dfcd9ccf278dc93a6ba4bdf08a626de963efbcf65afe6228dc403e4bb376aa0357a7481688f9f8d130ccbab343743de122fa6b48be4355b74de20bb59038863e707f559d6ed5acb0dc4b89e26c66c4f45", 0x98, 0xffffffffffffffff, 0x0, 0x0, r3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x100, r4, &(0x7f0000000280)="2ecc755abbe4d1d8ea865be9869a7fb2a1bf41b9b52357ee04f96779fc34321bb40b598f3c21841727aec610d8a2c2262e59c28d3e91b0f32aa208c0b4c724d2b10da4ff79bad8ec317329e101c676d1e83c1a710e09ff274c69f1d3a4ba7affc026c88f69302c01406172aecadc878dbb9b25a04db20b5233669aab882141ab7ec9212aadde3d9ff485d39e7c138b32f9af031c77ed86e031c968d8d175da20bb86f0ddcc459e978fcf", 0xaa, 0x6, 0x0, 0x1, r5}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x2, 0x6, r8, &(0x7f00000003c0)="c0b142470485bcda910f0a318479ad516b04b2be48016bca7add8d4d4e2dc83f8a7caf74b8a8251f5d4557854b0bdefe1f700f1c6b1dc63253a79e534ccd0ffe3235ecfff4977ea0dd201b4914616abff36b421bec9f794a282f66c62669eeafda960da3ee820ddf98e5dc00aefdd4acb4398547c6e93fdc86b4a1531b91c9118438d0cbb921290446978ad0df661719e2d6176f0888", 0x96, 0x674, 0x0, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0xffff, r2, &(0x7f00000004c0)="bf4c75bec9750f05aef4f05266e41473226096fce18d76f3302125e052de5deee164897512e9a5064f33e490472ac1fef3103173c851a7c212e7674a3f3f78a281a9c28b2800a9cc7cee7b3cc99becc1b5bfbc68ae08c64a246d174c8aceb282d2e6233c87934c4f354d9b7f15746435fc6f7350953dc8d4e5559b9ae09bc35bbbb5dce8c442c67b23adc48386109f2ee15b2529908d4ea049b34f56f43f7049093b2795131d7c50f1c887c05af866f3ce629a2eaf766cf6f33b6b1dd744d6ee2e9d884dad7d1dddc70dec3e3851b20da76372a1", 0xd4, 0x100000001, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x8001, r9, &(0x7f0000001240)="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", 0x1000, 0xc98, 0x0, 0x2}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f0000000680)="c6bb8ed2c5b235cc8dc801a4c9119698699766b0c1cd52899afa74a8130bea5ead3bcddfc7d71f3b67cbe27e6ffa", 0x2e, 0x7, 0x0, 0x2}]) (async)
ftruncate(r2, 0x8000000000000000) (async)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)

12:09:14 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 42)

[  308.068029] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  308.075841] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  308.083116] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  308.090387] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  308.097653] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  308.104916] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
12:09:14 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000000100)='\xdf\x00\x00\xf2\fd\xca\x86\x90w.88\xe2(O+b\x17\xff7Z\x0eE\xfa\x8eN\x98\xefk5\x8e\x80\x89S\xf5E\xd3\xf6\x19\xfb\x05\x00\x00\x00\x00\x00\x00\x00\x02\xa2\r\xe1c\xdf%\xb2\xa0\xee\xd9\xba\a6.\xbb\x84V\xc7\xa3\\\xa7\xc6\xe0d\x0e\x84\xda\xf2/1\x89\x8c:\xc8\x88\xe8\xe5\x80o\xfc#\xcc\x8f\x92\xff\x19F\x13\xfe\x8f\xf3\b\x13\xbb9\x8c\v\xbc^ \x817C\xf1.\x9d>0\x01\x0f\xd2}\x8a\xcaE\xdd\x90\xa68\xd0\x1aa\xd2\xac7\xa6\x80<8W:\xcfP\xe4\xd0{\xa5\xe7\xb0\xd5\x1f\xd2\\\xf9\x8a\n\r\xa3^\x15\xc0\xf5&/\xf6{\xab\xe6\x18d\xdcIJ[?\xacT\tk+\x9c].', 0x2, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140))
mq_timedsend(r1, &(0x7f0000000240)="77b713981cc8a04b892b97a95ef62551a519f3d638872a5a34a1cb4e58e92bec2ad609ad2865fb0db69897b6313b0c40c3100d4f577197191262a881425d7c26bebe23df5cebfae5757d034d4ace6abf635747eaa9532dfc8010eba3b8bb9ee6c0ec835e4384f3078d6bb96064562c06556dbb9f5efeda16e16662ea33c43cdeadd8d0aa05d04729c1eb42ed34081146b4bbd07cd5803dff35b176b62dda83e535623c970d9c5b4d83098452e63052f294357a386856a5286f810f86875d54989aca9c0d6be89a8b5a42b6896cd6344a2743643ec57c8f8345469bb9fe0624c612fd280c59", 0xe5, 0x100, &(0x7f00000000c0)={0x77359400})
preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/111, 0x6f}, {&(0x7f00000003c0)=""/1, 0x1}], 0x2, 0xf55f, 0x7)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0xe9, 0x81, 0x9, 0x0, 0x7f1a, 0x3000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x10800, 0x1000, 0x5, 0x3, 0xffffffffffff7fff, 0x9, 0xffff, 0x0, 0x89a7, 0x0, 0xf1}, 0x0, 0xe, 0xffffffffffffffff, 0x2)

12:09:14 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x101081, 0x0)
ioctl$SNDCTL_DSP_GETOSPACE(r1, 0x8010500c, &(0x7f00000000c0)) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0)

12:09:14 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000000100)='\xdf\x00\x00\xf2\fd\xca\x86\x90w.88\xe2(O+b\x17\xff7Z\x0eE\xfa\x8eN\x98\xefk5\x8e\x80\x89S\xf5E\xd3\xf6\x19\xfb\x05\x00\x00\x00\x00\x00\x00\x00\x02\xa2\r\xe1c\xdf%\xb2\xa0\xee\xd9\xba\a6.\xbb\x84V\xc7\xa3\\\xa7\xc6\xe0d\x0e\x84\xda\xf2/1\x89\x8c:\xc8\x88\xe8\xe5\x80o\xfc#\xcc\x8f\x92\xff\x19F\x13\xfe\x8f\xf3\b\x13\xbb9\x8c\v\xbc^ \x817C\xf1.\x9d>0\x01\x0f\xd2}\x8a\xcaE\xdd\x90\xa68\xd0\x1aa\xd2\xac7\xa6\x80<8W:\xcfP\xe4\xd0{\xa5\xe7\xb0\xd5\x1f\xd2\\\xf9\x8a\n\r\xa3^\x15\xc0\xf5&/\xf6{\xab\xe6\x18d\xdcIJ[?\xacT\tk+\x9c].', 0x2, 0x0, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140))
mq_timedsend(r1, &(0x7f0000000240)="77b713981cc8a04b892b97a95ef62551a519f3d638872a5a34a1cb4e58e92bec2ad609ad2865fb0db69897b6313b0c40c3100d4f577197191262a881425d7c26bebe23df5cebfae5757d034d4ace6abf635747eaa9532dfc8010eba3b8bb9ee6c0ec835e4384f3078d6bb96064562c06556dbb9f5efeda16e16662ea33c43cdeadd8d0aa05d04729c1eb42ed34081146b4bbd07cd5803dff35b176b62dda83e535623c970d9c5b4d83098452e63052f294357a386856a5286f810f86875d54989aca9c0d6be89a8b5a42b6896cd6344a2743643ec57c8f8345469bb9fe0624c612fd280c59", 0xe5, 0x100, &(0x7f00000000c0)={0x77359400}) (async, rerun: 32)
preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/111, 0x6f}, {&(0x7f00000003c0)=""/1, 0x1}], 0x2, 0xf55f, 0x7) (async, rerun: 32)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0xe9, 0x81, 0x9, 0x0, 0x7f1a, 0x3000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x10800, 0x1000, 0x5, 0x3, 0xffffffffffff7fff, 0x9, 0xffff, 0x0, 0x89a7, 0x0, 0xf1}, 0x0, 0xe, 0xffffffffffffffff, 0x2)

[  308.193809] FAULT_INJECTION: forcing a failure.
[  308.193809] name failslab, interval 1, probability 0, space 0, times 0
[  308.221043] CPU: 1 PID: 18768 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  308.228947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  308.238296] Call Trace:
[  308.240892]  dump_stack+0x1b2/0x281
[  308.244523]  should_fail.cold+0x10a/0x149
[  308.248676]  should_failslab+0xd6/0x130
[  308.252651]  kmem_cache_alloc+0x28e/0x3c0
[  308.256801]  ext4_mb_new_blocks+0x514/0x3db0
[  308.261216]  ? ext4_find_extent+0x6f7/0xbc0
[  308.265534]  ? ext4_ext_search_right+0x2bc/0xaa0
[  308.270286]  ? ext4_inode_to_goal_block+0x29a/0x3b0
[  308.275305]  ext4_ext_map_blocks+0x2845/0x6b10
[  308.279881]  ? __lock_acquire+0x5fc/0x3f20
[  308.284114]  ? mark_buffer_dirty+0x95/0x480
[  308.288423]  ? trace_hardirqs_on+0x10/0x10
[  308.292644]  ? __ext4_handle_dirty_metadata+0x120/0x480
[  308.297989]  ? ext4_find_delalloc_cluster+0x180/0x180
[  308.303162]  ? trace_hardirqs_on+0x10/0x10
[  308.307382]  ? ext4_mark_iloc_dirty+0x1822/0x26a0
[  308.312214]  ? ext4_es_lookup_extent+0x321/0xac0
[  308.316957]  ? lock_acquire+0x170/0x3f0
[  308.320933]  ext4_map_blocks+0x675/0x1730
[  308.325090]  ? ext4_issue_zeroout+0x150/0x150
[  308.329576]  ? __ext4_new_inode+0x27c/0x4eb0
[  308.333975]  ext4_getblk+0x98/0x3f0
[  308.337586]  ? ext4_iomap_begin+0x7f0/0x7f0
[  308.341903]  ext4_bread+0x6c/0x1a0
[  308.345433]  ? ext4_getblk+0x3f0/0x3f0
[  308.349301]  ? dquot_initialize_needed+0x240/0x240
[  308.354237]  ext4_append+0x143/0x350
[  308.357939]  ext4_mkdir+0x4c9/0xbd0
[  308.361556]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  308.366212]  ? security_inode_mkdir+0xca/0x100
[  308.370792]  vfs_mkdir+0x463/0x6e0
[  308.374321]  SyS_mkdirat+0x1fd/0x270
[  308.378020]  ? SyS_mknod+0x30/0x30
[  308.381555]  ? fput_many+0xe/0x140
[  308.385078]  ? do_syscall_64+0x4c/0x640
[  308.389036]  ? SyS_mknod+0x30/0x30
[  308.392563]  do_syscall_64+0x1d5/0x640
[  308.396617]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  308.401792] RIP: 0033:0x7f5c30ced317
[  308.405487] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  308.413185] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30ced317
[  308.420440] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  308.427689] RBP: 00007f5c2f6631d0 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  308.434939] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
12:09:14 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 48)

[  308.442190] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
[  308.500509] FAULT_INJECTION: forcing a failure.
[  308.500509] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  308.512324] CPU: 1 PID: 18803 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  308.520204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  308.529561] Call Trace:
[  308.532153]  dump_stack+0x1b2/0x281
[  308.535788]  should_fail.cold+0x10a/0x149
[  308.539946]  __alloc_pages_nodemask+0x22c/0x2720
[  308.544707]  ? is_bpf_text_address+0x91/0x150
[  308.549212]  ? __lock_acquire+0x5fc/0x3f20
[  308.553453]  ? cmp_ex_sort+0xb0/0xb0
[  308.557172]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  308.562011]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  308.566859]  ? error_exit+0xb/0x20
[  308.570409]  ? fs_reclaim_release+0xd0/0x110
[  308.575010]  cache_grow_begin+0x91/0x700
[  308.579070]  ? fs_reclaim_release+0xd0/0x110
[  308.583484]  ? check_preemption_disabled+0x35/0x240
[  308.588501]  cache_alloc_refill+0x273/0x350
[  308.592826]  kmem_cache_alloc+0x333/0x3c0
[  308.596981]  getname_flags+0xc8/0x550
[  308.600779]  ? __do_page_fault+0x159/0xad0
[  308.605017]  user_path_at_empty+0x2a/0x50
[  308.609163]  do_mount+0x118/0x2a30
[  308.612690]  ? __do_page_fault+0x159/0xad0
[  308.616999]  ? retint_kernel+0x2d/0x2d
[  308.620874]  ? copy_mount_string+0x40/0x40
[  308.625096]  ? memset+0x20/0x40
[  308.628361]  ? copy_mount_options+0x1fa/0x2f0
[  308.632837]  ? copy_mnt_ns+0xa30/0xa30
[  308.636709]  SyS_mount+0xa8/0x120
[  308.640145]  ? copy_mnt_ns+0xa30/0xa30
[  308.644020]  do_syscall_64+0x1d5/0x640
12:09:15 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x60000, 0xc7)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:09:15 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x101081, 0x0)
ioctl$SNDCTL_DSP_GETOSPACE(r1, 0x8010500c, &(0x7f00000000c0)) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0)

12:09:15 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 43)

[  308.647896]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  308.653068] RIP: 0033:0x7faf49cac73a
[  308.656760] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  308.664456] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  308.671725] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  308.678978] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  308.686233] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  308.693484] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
12:09:15 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:15 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000000100)='\xdf\x00\x00\xf2\fd\xca\x86\x90w.88\xe2(O+b\x17\xff7Z\x0eE\xfa\x8eN\x98\xefk5\x8e\x80\x89S\xf5E\xd3\xf6\x19\xfb\x05\x00\x00\x00\x00\x00\x00\x00\x02\xa2\r\xe1c\xdf%\xb2\xa0\xee\xd9\xba\a6.\xbb\x84V\xc7\xa3\\\xa7\xc6\xe0d\x0e\x84\xda\xf2/1\x89\x8c:\xc8\x88\xe8\xe5\x80o\xfc#\xcc\x8f\x92\xff\x19F\x13\xfe\x8f\xf3\b\x13\xbb9\x8c\v\xbc^ \x817C\xf1.\x9d>0\x01\x0f\xd2}\x8a\xcaE\xdd\x90\xa68\xd0\x1aa\xd2\xac7\xa6\x80<8W:\xcfP\xe4\xd0{\xa5\xe7\xb0\xd5\x1f\xd2\\\xf9\x8a\n\r\xa3^\x15\xc0\xf5&/\xf6{\xab\xe6\x18d\xdcIJ[?\xacT\tk+\x9c].', 0x2, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140))
mq_timedsend(r1, &(0x7f0000000240)="77b713981cc8a04b892b97a95ef62551a519f3d638872a5a34a1cb4e58e92bec2ad609ad2865fb0db69897b6313b0c40c3100d4f577197191262a881425d7c26bebe23df5cebfae5757d034d4ace6abf635747eaa9532dfc8010eba3b8bb9ee6c0ec835e4384f3078d6bb96064562c06556dbb9f5efeda16e16662ea33c43cdeadd8d0aa05d04729c1eb42ed34081146b4bbd07cd5803dff35b176b62dda83e535623c970d9c5b4d83098452e63052f294357a386856a5286f810f86875d54989aca9c0d6be89a8b5a42b6896cd6344a2743643ec57c8f8345469bb9fe0624c612fd280c59", 0xe5, 0x100, &(0x7f00000000c0)={0x77359400})
preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/111, 0x6f}, {&(0x7f00000003c0)=""/1, 0x1}], 0x2, 0xf55f, 0x7)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0xe9, 0x81, 0x9, 0x0, 0x7f1a, 0x3000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x10800, 0x1000, 0x5, 0x3, 0xffffffffffff7fff, 0x9, 0xffff, 0x0, 0x89a7, 0x0, 0xf1}, 0x0, 0xe, 0xffffffffffffffff, 0x2)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000000100)='\xdf\x00\x00\xf2\fd\xca\x86\x90w.88\xe2(O+b\x17\xff7Z\x0eE\xfa\x8eN\x98\xefk5\x8e\x80\x89S\xf5E\xd3\xf6\x19\xfb\x05\x00\x00\x00\x00\x00\x00\x00\x02\xa2\r\xe1c\xdf%\xb2\xa0\xee\xd9\xba\a6.\xbb\x84V\xc7\xa3\\\xa7\xc6\xe0d\x0e\x84\xda\xf2/1\x89\x8c:\xc8\x88\xe8\xe5\x80o\xfc#\xcc\x8f\x92\xff\x19F\x13\xfe\x8f\xf3\b\x13\xbb9\x8c\v\xbc^ \x817C\xf1.\x9d>0\x01\x0f\xd2}\x8a\xcaE\xdd\x90\xa68\xd0\x1aa\xd2\xac7\xa6\x80<8W:\xcfP\xe4\xd0{\xa5\xe7\xb0\xd5\x1f\xd2\\\xf9\x8a\n\r\xa3^\x15\xc0\xf5&/\xf6{\xab\xe6\x18d\xdcIJ[?\xacT\tk+\x9c].', 0x2, 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000140)) (async)
mq_timedsend(r1, &(0x7f0000000240)="77b713981cc8a04b892b97a95ef62551a519f3d638872a5a34a1cb4e58e92bec2ad609ad2865fb0db69897b6313b0c40c3100d4f577197191262a881425d7c26bebe23df5cebfae5757d034d4ace6abf635747eaa9532dfc8010eba3b8bb9ee6c0ec835e4384f3078d6bb96064562c06556dbb9f5efeda16e16662ea33c43cdeadd8d0aa05d04729c1eb42ed34081146b4bbd07cd5803dff35b176b62dda83e535623c970d9c5b4d83098452e63052f294357a386856a5286f810f86875d54989aca9c0d6be89a8b5a42b6896cd6344a2743643ec57c8f8345469bb9fe0624c612fd280c59", 0xe5, 0x100, &(0x7f00000000c0)={0x77359400}) (async)
preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/111, 0x6f}, {&(0x7f00000003c0)=""/1, 0x1}], 0x2, 0xf55f, 0x7) (async)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0xe9, 0x81, 0x9, 0x0, 0x7f1a, 0x3000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x10800, 0x1000, 0x5, 0x3, 0xffffffffffff7fff, 0x9, 0xffff, 0x0, 0x89a7, 0x0, 0xf1}, 0x0, 0xe, 0xffffffffffffffff, 0x2) (async)

12:09:15 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r3 = perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000002c0)=',\xf0*:)%+\x00')
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x5, 0x7f, 0x8, 0x3, 0x0, 0x6, 0x104, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x82e}, 0xc490, 0x8001, 0x7f, 0x3, 0x9, 0x4, 0xeb1e, 0x0, 0x7ff, 0x0, 0x401}, r1, 0x8, r0, 0x0)
r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=<r5=>0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x7f, 0x5, 0xd9, 0x0, 0x9, 0x9802, 0x6, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaca, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40400, 0xfffffffffffffffe, 0xfffffff9, 0x4, 0x10001, 0x100, 0x7fff, 0x0, 0x8000, 0x0, 0x8}, r5, 0xf, 0xffffffffffffffff, 0x1)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  308.776434] vxfs: WRONG superblock magic 00000000 at 1
[  308.788125] vxfs: WRONG superblock magic 00000000 at 8
[  308.795487] FAULT_INJECTION: forcing a failure.
[  308.795487] name failslab, interval 1, probability 0, space 0, times 0
[  308.795786] vxfs: can't find superblock.
[  308.806799] CPU: 0 PID: 18819 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  308.818697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  308.828046] Call Trace:
[  308.830633]  dump_stack+0x1b2/0x281
[  308.834263]  should_fail.cold+0x10a/0x149
[  308.838413]  should_failslab+0xd6/0x130
[  308.842384]  kmem_cache_alloc+0x40/0x3c0
[  308.846433]  __es_insert_extent+0x338/0x1360
[  308.850837]  ext4_es_insert_extent+0x1b9/0x530
[  308.855404]  ? ext4_es_find_delayed_extent_range+0x930/0x930
[  308.861197]  ext4_map_blocks+0x887/0x1730
[  308.865336]  ? ext4_issue_zeroout+0x150/0x150
[  308.869815]  ? __ext4_new_inode+0x27c/0x4eb0
[  308.874220]  ext4_getblk+0x98/0x3f0
[  308.877860]  ? ext4_iomap_begin+0x7f0/0x7f0
[  308.882183]  ext4_bread+0x6c/0x1a0
[  308.885711]  ? ext4_getblk+0x3f0/0x3f0
[  308.889590]  ? dquot_initialize_needed+0x240/0x240
[  308.894516]  ext4_append+0x143/0x350
[  308.898223]  ext4_mkdir+0x4c9/0xbd0
[  308.901851]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  308.906519]  ? security_inode_mkdir+0xca/0x100
[  308.911119]  vfs_mkdir+0x463/0x6e0
[  308.914669]  SyS_mkdirat+0x1fd/0x270
[  308.918371]  ? SyS_mknod+0x30/0x30
[  308.921899]  ? fput_many+0xe/0x140
[  308.925449]  ? do_syscall_64+0x4c/0x640
[  308.929409]  ? SyS_mknod+0x30/0x30
[  308.932939]  do_syscall_64+0x1d5/0x640
[  308.936834]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  308.942007] RIP: 0033:0x7f5c30ced317
[  308.945703] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  308.953404] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30ced317
[  308.960670] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  308.967936] RBP: 00007f5c2f6631d0 R08: 0000000000000000 R09: 00007f5c2f6631d0
12:09:15 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r3 = perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb) (async)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000002c0)=',\xf0*:)%+\x00') (async)
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x5, 0x7f, 0x8, 0x3, 0x0, 0x6, 0x104, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x82e}, 0xc490, 0x8001, 0x7f, 0x3, 0x9, 0x4, 0xeb1e, 0x0, 0x7ff, 0x0, 0x401}, r1, 0x8, r0, 0x0)
r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=<r5=>0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x7f, 0x5, 0xd9, 0x0, 0x9, 0x9802, 0x6, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaca, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40400, 0xfffffffffffffffe, 0xfffffff9, 0x4, 0x10001, 0x100, 0x7fff, 0x0, 0x8000, 0x0, 0x8}, r5, 0xf, 0xffffffffffffffff, 0x1) (async)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  308.975243] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  308.982506] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
12:09:15 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:15 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 49)

12:09:15 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

12:09:15 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r1 = gettid()
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x477da178}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r3 = perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xffffffffffff8001, 0x3}, 0x4a8, 0x7ff, 0xfff, 0x3, 0x0, 0x5, 0x5, 0x0, 0x4, 0x0, 0x6}, r1, 0xa, r2, 0xb)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x1014, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x8, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0xcd3512cd5fe1bccb, 0x132, 0x80000003, 0x2, 0x0, 0x80000001, 0x5, 0x0, 0x9, 0x0, 0x7}, r1, 0x8, 0xffffffffffffffff, 0x9) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000002c0)=',\xf0*:)%+\x00')
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x5, 0x7f, 0x8, 0x3, 0x0, 0x6, 0x104, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x82e}, 0xc490, 0x8001, 0x7f, 0x3, 0x9, 0x4, 0xeb1e, 0x0, 0x7ff, 0x0, 0x401}, r1, 0x8, r0, 0x0) (async)
r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=<r5=>0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x7f, 0x5, 0xd9, 0x0, 0x9, 0x9802, 0x6, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaca, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40400, 0xfffffffffffffffe, 0xfffffff9, 0x4, 0x10001, 0x100, 0x7fff, 0x0, 0x8000, 0x0, 0x8}, r5, 0xf, 0xffffffffffffffff, 0x1) (async)
write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  309.115184] FAULT_INJECTION: forcing a failure.
[  309.115184] name failslab, interval 1, probability 0, space 0, times 0
[  309.141051] CPU: 1 PID: 18846 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  309.148959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  309.158316] Call Trace:
[  309.160924]  dump_stack+0x1b2/0x281
[  309.164564]  should_fail.cold+0x10a/0x149
[  309.168725]  should_failslab+0xd6/0x130
[  309.172327] vxfs: WRONG superblock magic 00000000 at 1
[  309.172704]  kmem_cache_alloc+0x28e/0x3c0
[  309.178279] vxfs: WRONG superblock magic 00000000 at 8
[  309.182114]  getname_kernel+0x4e/0x340
[  309.182127]  kern_path+0x1b/0x40
[  309.182138]  lookup_bdev+0xc6/0x1c0
[  309.182147]  ? bd_acquire+0x440/0x440
[  309.182156]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  309.182168]  ? rcu_read_lock_sched_held+0x16c/0x1d0
[  309.182178]  blkdev_get_by_path+0x1b/0xa0
[  309.182187]  mount_bdev+0x4c/0x360
[  309.182195]  ? vxfs_try_sb_magic+0x3b0/0x3b0
[  309.182204]  mount_fs+0x92/0x2a0
[  309.182218]  vfs_kern_mount.part.0+0x5b/0x470
[  309.182229]  do_mount+0xe65/0x2a30
[  309.182242]  ? __do_page_fault+0x159/0xad0
[  309.182253]  ? retint_kernel+0x2d/0x2d
[  309.182264]  ? copy_mount_string+0x40/0x40
[  309.248376]  ? memset+0x20/0x40
[  309.251641]  ? copy_mount_options+0x1fa/0x2f0
[  309.256118]  ? copy_mnt_ns+0xa30/0xa30
[  309.259987]  SyS_mount+0xa8/0x120
[  309.263423]  ? copy_mnt_ns+0xa30/0xa30
[  309.267294]  do_syscall_64+0x1d5/0x640
[  309.271168]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  309.276338] RIP: 0033:0x7faf49cac73a
[  309.280029] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  309.287717] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  309.294970] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  309.302221] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
12:09:15 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

[  309.309471] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  309.316723] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  309.324843] vxfs: can't find superblock.
12:09:15 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

12:09:15 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)

12:09:15 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x60000, 0xc7) (async, rerun: 64)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (rerun: 64)
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:09:15 executing program 3:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, r0, 0x0)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x3ff)

12:09:15 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 44)

12:09:15 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 50)

12:09:16 executing program 3:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, r0, 0x0)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x3ff)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, r0, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x3ff) (async)

[  309.647591] FAULT_INJECTION: forcing a failure.
[  309.647591] name failslab, interval 1, probability 0, space 0, times 0
[  309.658864] CPU: 0 PID: 18879 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  309.666746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  309.676097] Call Trace:
[  309.678686]  dump_stack+0x1b2/0x281
[  309.682324]  should_fail.cold+0x10a/0x149
[  309.686481]  should_failslab+0xd6/0x130
[  309.690457]  kmem_cache_alloc+0x40/0x3c0
12:09:16 executing program 3:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, r0, 0x0)
r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x3ff)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, r0, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x3ff) (async)

[  309.694521]  __es_insert_extent+0x338/0x1360
[  309.698930]  ? __es_shrink+0x8c0/0x8c0
[  309.702822]  ? lock_acquire+0x170/0x3f0
[  309.706798]  ? ext4_es_insert_extent+0x11f/0x530
[  309.711560]  ext4_es_insert_extent+0x1b9/0x530
[  309.716153]  ? ext4_es_find_delayed_extent_range+0x930/0x930
[  309.721958]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  309.727523]  ? ext4_es_find_delayed_extent_range+0x646/0x930
[  309.733343]  ext4_ext_map_blocks+0x1e2c/0x6b10
[  309.737935]  ? __lock_acquire+0x5fc/0x3f20
[  309.742175]  ? __lock_acquire+0x5fc/0x3f20
12:09:16 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x200, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
r1 = getpgrp(0xffffffffffffffff)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x7, 0x3, 0xc8, 0x0, 0xfffffffffffffeff, 0x58243, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc2d, 0x2, @perf_config_ext={0x3f, 0x4}, 0x42000, 0x71d42de2, 0x81, 0x8, 0x2, 0x87f, 0xb5, 0x0, 0x1, 0x0, 0x7fff}, r1, 0xf, 0xffffffffffffffff, 0x9)

12:09:16 executing program 5:
recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000000c0)=""/82, 0x52}, {&(0x7f0000000000)=""/39, 0x27}, {&(0x7f0000000180)=""/146, 0x92}, {&(0x7f0000000240)=""/55, 0x37}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/228, 0xe4}, {&(0x7f0000001380)=""/141, 0x8d}, {&(0x7f0000001440)=""/226, 0xe2}, {&(0x7f0000001540)=""/236, 0xec}, {&(0x7f0000001640)=""/185, 0xb9}], 0xa, &(0x7f00000017c0)=""/97, 0x61}}, {{&(0x7f0000001840)=@in6, 0x80, &(0x7f0000001d00)=[{&(0x7f00000018c0)=""/226, 0xe2}, {&(0x7f00000019c0)=""/37, 0x25}, {&(0x7f0000001a00)=""/45, 0x2d}, {&(0x7f0000001a40)=""/94, 0x5e}, {&(0x7f0000001ac0)=""/144, 0x90}, {&(0x7f0000001b80)=""/185, 0xb9}, {&(0x7f0000001c40)=""/157, 0x9d}], 0x7, &(0x7f0000001d80)=""/122, 0x7a}, 0x3}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/79, 0x4f}, {&(0x7f0000001e80)=""/37, 0x25}, {&(0x7f0000001ec0)}], 0x3, &(0x7f0000001f40)=""/160, 0xa0}}, {{&(0x7f0000002000)=@caif=@dgm, 0x80, &(0x7f0000002100)=[{&(0x7f0000002080)=""/74, 0x4a}], 0x1, &(0x7f0000002140)}, 0x2}, {{&(0x7f0000002180)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002200)=""/243, 0xf3}, {&(0x7f0000002300)=""/183, 0xb7}, {&(0x7f00000023c0)=""/139, 0x8b}, {&(0x7f0000002480)=""/96, 0x60}, {&(0x7f0000002500)}, {&(0x7f0000002540)=""/232, 0xe8}], 0x6, &(0x7f00000026c0)=""/5, 0x5}, 0x4}], 0x5, 0x10002, &(0x7f0000002840)={0x0, 0x989680})
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000002140)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004005}, 0x4800)

[  309.746415]  ? mark_buffer_dirty+0x95/0x480
[  309.750739]  ? trace_hardirqs_on+0x10/0x10
[  309.754983]  ? __ext4_handle_dirty_metadata+0x120/0x480
[  309.760440]  ? ext4_find_delalloc_cluster+0x180/0x180
[  309.765629]  ? trace_hardirqs_on+0x10/0x10
[  309.769861]  ? ext4_mark_iloc_dirty+0x1822/0x26a0
[  309.774717]  ? ext4_es_lookup_extent+0x321/0xac0
[  309.779483]  ? lock_acquire+0x170/0x3f0
[  309.783465]  ? lock_acquire+0x170/0x3f0
[  309.787438]  ? ext4_map_blocks+0x29f/0x1730
[  309.791772]  ext4_map_blocks+0xb19/0x1730
12:09:16 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x200, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
r1 = getpgrp(0xffffffffffffffff)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x7, 0x3, 0xc8, 0x0, 0xfffffffffffffeff, 0x58243, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc2d, 0x2, @perf_config_ext={0x3f, 0x4}, 0x42000, 0x71d42de2, 0x81, 0x8, 0x2, 0x87f, 0xb5, 0x0, 0x1, 0x0, 0x7fff}, r1, 0xf, 0xffffffffffffffff, 0x9)

[  309.795928]  ? ext4_issue_zeroout+0x150/0x150
[  309.800425]  ? __ext4_new_inode+0x27c/0x4eb0
[  309.804851]  ext4_getblk+0x98/0x3f0
[  309.808481]  ? ext4_iomap_begin+0x7f0/0x7f0
[  309.812807]  ext4_bread+0x6c/0x1a0
[  309.816357]  ? ext4_getblk+0x3f0/0x3f0
[  309.820242]  ? dquot_initialize_needed+0x240/0x240
[  309.825177]  ext4_append+0x143/0x350
[  309.828902]  ext4_mkdir+0x4c9/0xbd0
[  309.832537]  ? ext4_init_dot_dotdot+0x5a0/0x5a0
[  309.837212]  ? security_inode_mkdir+0xca/0x100
[  309.841793]  vfs_mkdir+0x463/0x6e0
[  309.845339]  SyS_mkdirat+0x1fd/0x270
[  309.849053]  ? SyS_mknod+0x30/0x30
[  309.852599]  ? fput_many+0xe/0x140
[  309.856159]  ? do_syscall_64+0x4c/0x640
[  309.860119]  ? SyS_mknod+0x30/0x30
[  309.863645]  do_syscall_64+0x1d5/0x640
[  309.867537]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  309.872718] RIP: 0033:0x7f5c30ced317
[  309.876421] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102
[  309.884134] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30ced317
12:09:16 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x200, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
r1 = getpgrp(0xffffffffffffffff)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x7, 0x3, 0xc8, 0x0, 0xfffffffffffffeff, 0x58243, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc2d, 0x2, @perf_config_ext={0x3f, 0x4}, 0x42000, 0x71d42de2, 0x81, 0x8, 0x2, 0x87f, 0xb5, 0x0, 0x1, 0x0, 0x7fff}, r1, 0xf, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x200, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
getpgrp(0xffffffffffffffff) (async)
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x7, 0x3, 0xc8, 0x0, 0xfffffffffffffeff, 0x58243, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc2d, 0x2, @perf_config_ext={0x3f, 0x4}, 0x42000, 0x71d42de2, 0x81, 0x8, 0x2, 0x87f, 0xb5, 0x0, 0x1, 0x0, 0x7fff}, r1, 0xf, 0xffffffffffffffff, 0x9) (async)

[  309.891392] RDX: 00000000000001ff RSI: 0000000020005a00 RDI: 00000000ffffff9c
[  309.899005] RBP: 00007f5c2f6631d0 R08: 0000000000000000 R09: 00007f5c2f6631d0
[  309.906282] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200059c0
[  309.913551] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
[  309.931536] FAULT_INJECTION: forcing a failure.
[  309.931536] name failslab, interval 1, probability 0, space 0, times 0
[  309.972812] CPU: 0 PID: 18881 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  309.980713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  309.990065] Call Trace:
[  309.992658]  dump_stack+0x1b2/0x281
[  309.996298]  should_fail.cold+0x10a/0x149
[  310.000459]  should_failslab+0xd6/0x130
[  310.004446]  kmem_cache_alloc_trace+0x29a/0x3d0
[  310.009127]  ? copy_mnt_ns+0xa30/0xa30
[  310.013043]  copy_mount_options+0x59/0x2f0
[  310.017294]  ? copy_mnt_ns+0xa30/0xa30
[  310.021187]  SyS_mount+0x84/0x120
[  310.024641]  ? copy_mnt_ns+0xa30/0xa30
[  310.028531]  do_syscall_64+0x1d5/0x640
[  310.032411]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  310.037581] RIP: 0033:0x7faf49cac73a
[  310.041274] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  310.048965] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  310.056216] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  310.063482] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
12:09:16 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x80, 0x0)
sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="01012bbd70ebfedbdf257c00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990009000000700000000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a00060008021100000100000a000600ffffffffffff00000a0006000802110000000000"], 0x94}, 0x1, 0x0, 0x0, 0x1}, 0x80800)
ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x7)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:16 executing program 5:
recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000000c0)=""/82, 0x52}, {&(0x7f0000000000)=""/39, 0x27}, {&(0x7f0000000180)=""/146, 0x92}, {&(0x7f0000000240)=""/55, 0x37}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/228, 0xe4}, {&(0x7f0000001380)=""/141, 0x8d}, {&(0x7f0000001440)=""/226, 0xe2}, {&(0x7f0000001540)=""/236, 0xec}, {&(0x7f0000001640)=""/185, 0xb9}], 0xa, &(0x7f00000017c0)=""/97, 0x61}}, {{&(0x7f0000001840)=@in6, 0x80, &(0x7f0000001d00)=[{&(0x7f00000018c0)=""/226, 0xe2}, {&(0x7f00000019c0)=""/37, 0x25}, {&(0x7f0000001a00)=""/45, 0x2d}, {&(0x7f0000001a40)=""/94, 0x5e}, {&(0x7f0000001ac0)=""/144, 0x90}, {&(0x7f0000001b80)=""/185, 0xb9}, {&(0x7f0000001c40)=""/157, 0x9d}], 0x7, &(0x7f0000001d80)=""/122, 0x7a}, 0x3}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/79, 0x4f}, {&(0x7f0000001e80)=""/37, 0x25}, {&(0x7f0000001ec0)}], 0x3, &(0x7f0000001f40)=""/160, 0xa0}}, {{&(0x7f0000002000)=@caif=@dgm, 0x80, &(0x7f0000002100)=[{&(0x7f0000002080)=""/74, 0x4a}], 0x1, &(0x7f0000002140)}, 0x2}, {{&(0x7f0000002180)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002200)=""/243, 0xf3}, {&(0x7f0000002300)=""/183, 0xb7}, {&(0x7f00000023c0)=""/139, 0x8b}, {&(0x7f0000002480)=""/96, 0x60}, {&(0x7f0000002500)}, {&(0x7f0000002540)=""/232, 0xe8}], 0x6, &(0x7f00000026c0)=""/5, 0x5}, 0x4}], 0x5, 0x10002, &(0x7f0000002840)={0x0, 0x989680})
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) (async, rerun: 32)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (rerun: 32)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140)) (async, rerun: 32)
sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000002140)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004005}, 0x4800) (rerun: 32)

12:09:16 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x60000, 0xc7)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:09:16 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 51)

12:09:16 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 45)

[  310.070746] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  310.078004] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  310.094322] vxfs: WRONG superblock magic 00000000 at 1
[  310.100778] vxfs: WRONG superblock magic 00000000 at 8
[  310.106491] vxfs: can't find superblock.
12:09:16 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:16 executing program 5:
recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000000c0)=""/82, 0x52}, {&(0x7f0000000000)=""/39, 0x27}, {&(0x7f0000000180)=""/146, 0x92}, {&(0x7f0000000240)=""/55, 0x37}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/228, 0xe4}, {&(0x7f0000001380)=""/141, 0x8d}, {&(0x7f0000001440)=""/226, 0xe2}, {&(0x7f0000001540)=""/236, 0xec}, {&(0x7f0000001640)=""/185, 0xb9}], 0xa, &(0x7f00000017c0)=""/97, 0x61}}, {{&(0x7f0000001840)=@in6, 0x80, &(0x7f0000001d00)=[{&(0x7f00000018c0)=""/226, 0xe2}, {&(0x7f00000019c0)=""/37, 0x25}, {&(0x7f0000001a00)=""/45, 0x2d}, {&(0x7f0000001a40)=""/94, 0x5e}, {&(0x7f0000001ac0)=""/144, 0x90}, {&(0x7f0000001b80)=""/185, 0xb9}, {&(0x7f0000001c40)=""/157, 0x9d}], 0x7, &(0x7f0000001d80)=""/122, 0x7a}, 0x3}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/79, 0x4f}, {&(0x7f0000001e80)=""/37, 0x25}, {&(0x7f0000001ec0)}], 0x3, &(0x7f0000001f40)=""/160, 0xa0}}, {{&(0x7f0000002000)=@caif=@dgm, 0x80, &(0x7f0000002100)=[{&(0x7f0000002080)=""/74, 0x4a}], 0x1, &(0x7f0000002140)}, 0x2}, {{&(0x7f0000002180)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002200)=""/243, 0xf3}, {&(0x7f0000002300)=""/183, 0xb7}, {&(0x7f00000023c0)=""/139, 0x8b}, {&(0x7f0000002480)=""/96, 0x60}, {&(0x7f0000002500)}, {&(0x7f0000002540)=""/232, 0xe8}], 0x6, &(0x7f00000026c0)=""/5, 0x5}, 0x4}], 0x5, 0x10002, &(0x7f0000002840)={0x0, 0x989680})
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000140))
sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000002140)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004005}, 0x4800)

12:09:16 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) (async)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)

[  310.200861] FAULT_INJECTION: forcing a failure.
[  310.200861] name failslab, interval 1, probability 0, space 0, times 0
[  310.214999] FAULT_INJECTION: forcing a failure.
[  310.214999] name failslab, interval 1, probability 0, space 0, times 0
[  310.243927] CPU: 0 PID: 18946 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  310.251829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  310.261180] Call Trace:
[  310.263764]  dump_stack+0x1b2/0x281
[  310.267381]  should_fail.cold+0x10a/0x149
[  310.271611]  should_failslab+0xd6/0x130
[  310.275589]  __kmalloc_track_caller+0x2bc/0x400
[  310.280247]  ? kstrdup_const+0x35/0x60
[  310.284136]  ? lock_downgrade+0x740/0x740
[  310.288364]  kstrdup+0x36/0x70
[  310.291553]  kstrdup_const+0x35/0x60
[  310.295252]  alloc_vfsmnt+0xe0/0x7f0
[  310.298948]  ? _raw_read_unlock+0x29/0x40
[  310.303078]  vfs_kern_mount.part.0+0x27/0x470
[  310.307561]  do_mount+0xe65/0x2a30
[  310.311085]  ? __do_page_fault+0x159/0xad0
[  310.315305]  ? retint_kernel+0x2d/0x2d
[  310.319177]  ? copy_mount_string+0x40/0x40
[  310.323396]  ? memset+0x20/0x40
[  310.326658]  ? copy_mount_options+0x1fa/0x2f0
[  310.331137]  ? copy_mnt_ns+0xa30/0xa30
[  310.335008]  SyS_mount+0xa8/0x120
[  310.338441]  ? copy_mnt_ns+0xa30/0xa30
[  310.342314]  do_syscall_64+0x1d5/0x640
[  310.346194]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  310.351370] RIP: 0033:0x7faf49cac73a
[  310.355062] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  310.362752] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  310.370006] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  310.377259] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  310.384510] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  310.391762] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
12:09:16 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x80, 0x0)
sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="01012bbd70ebfedbdf257c00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990009000000700000000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a00060008021100000100000a000600ffffffffffff00000a0006000802110000000000"], 0x94}, 0x1, 0x0, 0x0, 0x1}, 0x80800)
ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x7)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

[  310.412606] CPU: 0 PID: 18945 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  310.420586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  310.429940] Call Trace:
[  310.432534]  dump_stack+0x1b2/0x281
[  310.436166]  should_fail.cold+0x10a/0x149
[  310.440325]  should_failslab+0xd6/0x130
[  310.444305]  __kmalloc_track_caller+0x2bc/0x400
[  310.448971]  ? strndup_user+0x5b/0xf0
[  310.452771]  memdup_user+0x22/0xa0
[  310.456316]  strndup_user+0x5b/0xf0
[  310.459927]  ? copy_mnt_ns+0xa30/0xa30
[  310.463797]  SyS_mount+0x68/0x120
[  310.467926]  ? copy_mnt_ns+0xa30/0xa30
[  310.471800]  do_syscall_64+0x1d5/0x640
[  310.475680]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  310.480851] RIP: 0033:0x7f5c30cef73a
[  310.484648] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  310.492346] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cef73a
[  310.499610] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007f5c2f662fe0
12:09:16 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:16 executing program 5:
ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201)
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000300)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x8, 0x7, 0xc0, 0x9, 0x0, 0x1, 0x804, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x40a0d, 0xae, 0x0, 0x9, 0xed9f, 0x1, 0x2, 0x0, 0x7fff, 0x0, 0x7ff}, 0xffffffffffffffff, 0xe, r1, 0x1)
fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, <r3=>0x0})
r4 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x7f, 0x1, 0x7, 0x5a, 0x0, 0x6, 0x68025, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x3c}, 0x400, 0x10000, 0x6, 0x6, 0x4, 0x3, 0x16, 0x0, 0x4, 0x0, 0x2}, r3, 0xd, 0xffffffffffffffff, 0x1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0xff, 0x4, 0x3, 0x0, 0x401, 0x11605, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x431c}, 0x40, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x7, 0x0, 0x6, 0x0, 0xff}, 0x0, 0xb, r0, 0x11)
ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000500)=<r5=>0x0)
r6 = fcntl$dupfd(r2, 0x406, r4)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x6, 0x4, 0x9, 0x0, 0x9, 0x100, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x8000000000000001, 0xffffffffffffff00}, 0x48000, 0x100, 0x4, 0x4, 0x100000000, 0xfff, 0x9, 0x0, 0x401, 0x0, 0x3}, r5, 0x9, r6, 0x8)
ioctl$RFKILL_IOCTL_NOINPUT(r6, 0x5201)
r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$AUTOFS_IOC_PROTOVER(r7, 0x80049363, &(0x7f0000000200))
setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000340)={0x4, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}, {{0x2, 0x4e24, @private=0xa010100}}}, 0x108)

12:09:16 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000)={0x2, 0x1}, 0x2)

[  310.506862] RBP: 00007f5c2f663020 R08: 00007f5c2f663020 R09: 00000000200059c0
[  310.514116] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  310.521368] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
12:09:16 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x80, 0x0)
sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="01012bbd70ebfedbdf257c00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990009000000700000000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a00060008021100000100000a000600ffffffffffff00000a0006000802110000000000"], 0x94}, 0x1, 0x0, 0x0, 0x1}, 0x80800)
ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x7) (async, rerun: 32)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:17 executing program 5:
ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201)
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000300)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x8, 0x7, 0xc0, 0x9, 0x0, 0x1, 0x804, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x40a0d, 0xae, 0x0, 0x9, 0xed9f, 0x1, 0x2, 0x0, 0x7fff, 0x0, 0x7ff}, 0xffffffffffffffff, 0xe, r1, 0x1)
fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, <r3=>0x0})
r4 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x7f, 0x1, 0x7, 0x5a, 0x0, 0x6, 0x68025, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x3c}, 0x400, 0x10000, 0x6, 0x6, 0x4, 0x3, 0x16, 0x0, 0x4, 0x0, 0x2}, r3, 0xd, 0xffffffffffffffff, 0x1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0xff, 0x4, 0x3, 0x0, 0x401, 0x11605, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x431c}, 0x40, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x7, 0x0, 0x6, 0x0, 0xff}, 0x0, 0xb, r0, 0x11)
ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000500)=<r5=>0x0)
r6 = fcntl$dupfd(r2, 0x406, r4)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x6, 0x4, 0x9, 0x0, 0x9, 0x100, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x8000000000000001, 0xffffffffffffff00}, 0x48000, 0x100, 0x4, 0x4, 0x100000000, 0xfff, 0x9, 0x0, 0x401, 0x0, 0x3}, r5, 0x9, r6, 0x8)
ioctl$RFKILL_IOCTL_NOINPUT(r6, 0x5201)
r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$AUTOFS_IOC_PROTOVER(r7, 0x80049363, &(0x7f0000000200))
setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000340)={0x4, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}, {{0x2, 0x4e24, @private=0xa010100}}}, 0x108)
ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) (async)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
pipe(&(0x7f0000000300)) (async)
perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x8, 0x7, 0xc0, 0x9, 0x0, 0x1, 0x804, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x40a0d, 0xae, 0x0, 0x9, 0xed9f, 0x1, 0x2, 0x0, 0x7fff, 0x0, 0x7ff}, 0xffffffffffffffff, 0xe, r1, 0x1) (async)
fcntl$getownex(r0, 0x10, &(0x7f0000000000)) (async)
perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x7f, 0x1, 0x7, 0x5a, 0x0, 0x6, 0x68025, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x3c}, 0x400, 0x10000, 0x6, 0x6, 0x4, 0x3, 0x16, 0x0, 0x4, 0x0, 0x2}, r3, 0xd, 0xffffffffffffffff, 0x1) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0xff, 0x4, 0x3, 0x0, 0x401, 0x11605, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x431c}, 0x40, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x7, 0x0, 0x6, 0x0, 0xff}, 0x0, 0xb, r0, 0x11) (async)
ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000500)) (async)
fcntl$dupfd(r2, 0x406, r4) (async)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x6, 0x4, 0x9, 0x0, 0x9, 0x100, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x8000000000000001, 0xffffffffffffff00}, 0x48000, 0x100, 0x4, 0x4, 0x100000000, 0xfff, 0x9, 0x0, 0x401, 0x0, 0x3}, r5, 0x9, r6, 0x8) (async)
ioctl$RFKILL_IOCTL_NOINPUT(r6, 0x5201) (async)
openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) (async)
ioctl$AUTOFS_IOC_PROTOVER(r7, 0x80049363, &(0x7f0000000200)) (async)
setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000340)={0x4, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}, {{0x2, 0x4e24, @private=0xa010100}}}, 0x108) (async)

[  310.642690] misc userio: The device must be registered before sending interrupts
12:09:17 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000000)={0x1, 0xff}, 0x2)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

12:09:17 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000)={0x2, 0x1}, 0x2)

12:09:17 executing program 5:
ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201)
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000300)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x8, 0x7, 0xc0, 0x9, 0x0, 0x1, 0x804, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x40a0d, 0xae, 0x0, 0x9, 0xed9f, 0x1, 0x2, 0x0, 0x7fff, 0x0, 0x7ff}, 0xffffffffffffffff, 0xe, r1, 0x1)
fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, <r3=>0x0})
r4 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x7f, 0x1, 0x7, 0x5a, 0x0, 0x6, 0x68025, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x3c}, 0x400, 0x10000, 0x6, 0x6, 0x4, 0x3, 0x16, 0x0, 0x4, 0x0, 0x2}, r3, 0xd, 0xffffffffffffffff, 0x1)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0xff, 0x4, 0x3, 0x0, 0x401, 0x11605, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x431c}, 0x40, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x7, 0x0, 0x6, 0x0, 0xff}, 0x0, 0xb, r0, 0x11)
ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000500)=<r5=>0x0)
r6 = fcntl$dupfd(r2, 0x406, r4)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x6, 0x4, 0x9, 0x0, 0x9, 0x100, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x8000000000000001, 0xffffffffffffff00}, 0x48000, 0x100, 0x4, 0x4, 0x100000000, 0xfff, 0x9, 0x0, 0x401, 0x0, 0x3}, r5, 0x9, r6, 0x8)
ioctl$RFKILL_IOCTL_NOINPUT(r6, 0x5201)
r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$AUTOFS_IOC_PROTOVER(r7, 0x80049363, &(0x7f0000000200))
setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000340)={0x4, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}, {{0x2, 0x4e24, @private=0xa010100}}}, 0x108)
ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) (async)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
pipe(&(0x7f0000000300)) (async)
perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x8, 0x7, 0xc0, 0x9, 0x0, 0x1, 0x804, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x40a0d, 0xae, 0x0, 0x9, 0xed9f, 0x1, 0x2, 0x0, 0x7fff, 0x0, 0x7ff}, 0xffffffffffffffff, 0xe, r1, 0x1) (async)
fcntl$getownex(r0, 0x10, &(0x7f0000000000)) (async)
perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x7f, 0x1, 0x7, 0x5a, 0x0, 0x6, 0x68025, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x3c}, 0x400, 0x10000, 0x6, 0x6, 0x4, 0x3, 0x16, 0x0, 0x4, 0x0, 0x2}, r3, 0xd, 0xffffffffffffffff, 0x1) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0xff, 0x4, 0x3, 0x0, 0x401, 0x11605, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x431c}, 0x40, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x7, 0x0, 0x6, 0x0, 0xff}, 0x0, 0xb, r0, 0x11) (async)
ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000500)) (async)
fcntl$dupfd(r2, 0x406, r4) (async)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x6, 0x4, 0x9, 0x0, 0x9, 0x100, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x8000000000000001, 0xffffffffffffff00}, 0x48000, 0x100, 0x4, 0x4, 0x100000000, 0xfff, 0x9, 0x0, 0x401, 0x0, 0x3}, r5, 0x9, r6, 0x8) (async)
ioctl$RFKILL_IOCTL_NOINPUT(r6, 0x5201) (async)
openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) (async)
ioctl$AUTOFS_IOC_PROTOVER(r7, 0x80049363, &(0x7f0000000200)) (async)
setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000340)={0x4, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}, {{0x2, 0x4e24, @private=0xa010100}}}, 0x108) (async)

12:09:17 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 46)

12:09:17 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 52)

12:09:17 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000000, 0x8, 0x0, 0x0, 0x80, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x105002, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='*.\x00')
r2 = syz_open_dev$vcsa(&(0x7f0000000100), 0x56e1, 0x183002)
write$cgroup_int(r2, &(0x7f0000000180)=0x1f, 0x12)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:17 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000)={0x2, 0x1}, 0x2)

[  311.037465] misc userio: The device must be registered before sending interrupts
[  311.045789] FAULT_INJECTION: forcing a failure.
[  311.045789] name failslab, interval 1, probability 0, space 0, times 0
[  311.083859] CPU: 1 PID: 19006 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  311.091774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  311.101133] Call Trace:
[  311.103722]  dump_stack+0x1b2/0x281
[  311.107352]  should_fail.cold+0x10a/0x149
[  311.111519]  should_failslab+0xd6/0x130
[  311.115494]  __kmalloc_track_caller+0x2bc/0x400
[  311.120149]  ? strndup_user+0x5b/0xf0
[  311.123948]  memdup_user+0x22/0xa0
[  311.127482]  strndup_user+0x5b/0xf0
[  311.131094]  ? copy_mnt_ns+0xa30/0xa30
[  311.134966]  SyS_mount+0x68/0x120
[  311.138400]  ? copy_mnt_ns+0xa30/0xa30
[  311.142275]  do_syscall_64+0x1d5/0x640
[  311.146153]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  311.151326] RIP: 0033:0x7f5c30cef73a
[  311.155020] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  311.162710] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cef73a
[  311.169960] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007f5c2f662fe0
[  311.177213] RBP: 00007f5c2f663020 R08: 00007f5c2f663020 R09: 00000000200059c0
12:09:17 executing program 5:
r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$NS_GET_PARENT(r0, 0xb702, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  311.184474] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  311.191725] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
[  311.216643] FAULT_INJECTION: forcing a failure.
[  311.216643] name failslab, interval 1, probability 0, space 0, times 0
12:09:17 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000000, 0x8, 0x0, 0x0, 0x80, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0)
r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x105002, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='*.\x00')
r2 = syz_open_dev$vcsa(&(0x7f0000000100), 0x56e1, 0x183002)
write$cgroup_int(r2, &(0x7f0000000180)=0x1f, 0x12)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000000, 0x8, 0x0, 0x0, 0x80, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)) (async)
openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x105002, 0x0) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='*.\x00') (async)
syz_open_dev$vcsa(&(0x7f0000000100), 0x56e1, 0x183002) (async)
write$cgroup_int(r2, &(0x7f0000000180)=0x1f, 0x12) (async)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)

12:09:17 executing program 3:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
fsync(r0)
r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0)
write$tcp_congestion(r2, &(0x7f0000000040)='reno\x00', 0x5)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

[  311.235487] misc userio: The device must be registered before sending interrupts
[  311.277469] CPU: 0 PID: 19014 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  311.277476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  311.277480] Call Trace:
[  311.277495]  dump_stack+0x1b2/0x281
[  311.300902]  should_fail.cold+0x10a/0x149
[  311.305042]  should_failslab+0xd6/0x130
[  311.309004]  __kmalloc_track_caller+0x2bc/0x400
[  311.313659]  ? kstrdup_const+0x35/0x60
[  311.317527]  ? lock_downgrade+0x740/0x740
[  311.321660]  kstrdup+0x36/0x70
[  311.324838]  kstrdup_const+0x35/0x60
[  311.328536]  alloc_vfsmnt+0xe0/0x7f0
[  311.332233]  ? _raw_read_unlock+0x29/0x40
[  311.336367]  vfs_kern_mount.part.0+0x27/0x470
[  311.340850]  do_mount+0xe65/0x2a30
[  311.344379]  ? __do_page_fault+0x159/0xad0
[  311.348596]  ? retint_kernel+0x2d/0x2d
[  311.352468]  ? copy_mount_string+0x40/0x40
[  311.356688]  ? memset+0x20/0x40
[  311.359956]  ? copy_mount_options+0x1fa/0x2f0
[  311.364435]  ? copy_mnt_ns+0xa30/0xa30
[  311.368306]  SyS_mount+0xa8/0x120
[  311.371756]  ? copy_mnt_ns+0xa30/0xa30
[  311.375631]  do_syscall_64+0x1d5/0x640
[  311.379505]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  311.384692] RIP: 0033:0x7faf49cac73a
[  311.388385] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  311.396075] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  311.403412] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  311.410663] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  311.417913] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
12:09:17 executing program 5:
r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$NS_GET_PARENT(r0, 0xb702, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async)
ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) (async)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  311.425165] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
12:09:17 executing program 3:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0) (async)
fsync(r0) (async)
r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0)
write$tcp_congestion(r2, &(0x7f0000000040)='reno\x00', 0x5) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:18 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000000)={0x1, 0xff}, 0x2)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000000)={0x1, 0xff}, 0x2) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)

12:09:18 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 47)

12:09:18 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 53)

12:09:18 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000000, 0x8, 0x0, 0x0, 0x80, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r0=>0x0) (async)
r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x105002, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='*.\x00')
r2 = syz_open_dev$vcsa(&(0x7f0000000100), 0x56e1, 0x183002)
write$cgroup_int(r2, &(0x7f0000000180)=0x1f, 0x12) (async)
io_cancel(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)

12:09:18 executing program 5:
r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) (async)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:09:18 executing program 3:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
fsync(r0)
r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0)
write$tcp_congestion(r2, &(0x7f0000000040)='reno\x00', 0x5) (async)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:18 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2)
close(r0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:18 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r0, &(0x7f00000000c0)="8a6f49b67123653f86bc423ec572e264b7264044579f07dddd0477f6dd41d893020ee53e49ebbf2f209bb707bd02e1c4f8a26f43e60480e580f58a121bbefddd04f7bc5f6a3015e7a2d4299034903da6b2c7bc277437ab8fa14a8dcc743ae6b90cf26849358c9f8de25169e288f01b0181d2eac069f0b915492418f647904022860fb8ca9dc6daaf809a", 0x8a, 0xe84, &(0x7f0000000000)={0x77359400})

[  311.955189] FAULT_INJECTION: forcing a failure.
[  311.955189] name failslab, interval 1, probability 0, space 0, times 0
[  311.977980] FAULT_INJECTION: forcing a failure.
[  311.977980] name failslab, interval 1, probability 0, space 0, times 0
[  312.003521] CPU: 1 PID: 19073 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  312.011422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  312.020775] Call Trace:
[  312.023365]  dump_stack+0x1b2/0x281
[  312.026997]  should_fail.cold+0x10a/0x149
[  312.031160]  should_failslab+0xd6/0x130
[  312.035139]  kmem_cache_alloc_trace+0x29a/0x3d0
[  312.039806]  ? copy_mnt_ns+0xa30/0xa30
[  312.043695]  copy_mount_options+0x59/0x2f0
[  312.047927]  ? copy_mnt_ns+0xa30/0xa30
[  312.051809]  SyS_mount+0x84/0x120
[  312.055249]  ? copy_mnt_ns+0xa30/0xa30
[  312.059125]  do_syscall_64+0x1d5/0x640
[  312.063002]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  312.068176] RIP: 0033:0x7f5c30cef73a
[  312.071872] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  312.079572] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cef73a
[  312.086830] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007f5c2f662fe0
[  312.094082] RBP: 00007f5c2f663020 R08: 00007f5c2f663020 R09: 00000000200059c0
12:09:18 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16040, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, <r2=>r0, {0x3, 0x3f}}, './file0\x00'})
r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='tasks\x00', 0x2, 0x0)
r4 = eventfd2(0x80, 0x80000)
io_submit(r1, 0x5, &(0x7f00000006c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x5501, r0, &(0x7f0000000180)="15dd4b03fce757c5002b22917c75a78df76fbe949325cf4d0834b2ec50086b91877a86bf419ded53df5f6d42dc8db78b6d7be7416d7797e1a304dc0c2dfbab2238372ae859bd94f6d16b0e2c76e45d71cc6729b6a2fd09f551192bd132b60f3cfac7ee8d36b908d762155886b1a9850c6af6a8c2e7c7ce0456539db184172331c6ea4f02b502bc436a09fa7d4f655f83a9fe901497c185a620e2674dfdddce8d1f7981478aca5341", 0xa8, 0x3f, 0x0, 0x3}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000240)="0fece7bfd5c1cf6bbe2fc758bd4e451f0ed75d2c718ffcfb926cbcae21cca05eaeaad001396eaaab15f8d52b9d744a3045201cc705c0d094a7a29fea6e34b7821c31c4725b21c2ecc665b1cf4e8c45e6b258ae15437a3bdeed0adff02f6c8b1f4775b868ed36eb4b4173f0ed22b824d57b83e39f80cdad103c133da1a02d120f988915ed70c72a2fcba1a51dccf90c81335721a589ec24c8b80a67c9e7e75b15bfe81e4dab717222beed9b8c54aa1d5e91d3bc0da7177c75d24ad39f7c2554", 0xbf, 0xffffffff}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x1, r0, &(0x7f0000000300)="5709b2a3229b012abbd86d050aa3e730465429aad75fdd6e522b3fb57a281bd94197f64c45372e84cf13b75c66dfbec2a05d23b890c0d8af459968672c47edc946492178e2ba453ee9cf156f754307bc02ed0b5d89110956a6e4a9797dd01c3f2d55c5bde8e158c6369b540eec1a81d9afa4e28fe2c576f588f6fd0b661a4fcfcf86c002093782e2", 0x88, 0x1, 0x0, 0x5, r2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000400)="0cb3edd77c885250449522503c8a3662777c534c16614a62870ef9c91b1a0ef1ba66a1549423c6ce3046dd43a5c528eae9e4f1b832c20b8170770262e05b1d3c3254eb5826088dc9c65461eb79be8e6fc14e0ef02ac4a38f0a5b08dcfe66c3003b2048fe408e95d41bd357a705179e82b0a7620c2ebc58ddbdfd3529ec3eb34c65e3b207c91e00bc03db3be560efda42281e6cda2f0cac1a4970d1de17764f68a94428da8e7274d395450dca553396e67ba9c9a3a64f03913ab2c7af6333a212043c45ed4419b7062326ff87a2756088ec8f5c71e756bfb365e5b4fb14fb608b773861f05d844428d9d7d6910b9ffc6e5478f642", 0xf4, 0xfffffffffffffff8}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000580)="5a83931867b901041d99204523e27db9a8b483b53fe3c6fb212f883cef3986b74e9389b518e8e6d7857045634f209d542d84a97a5dd1f08606f4677d7aa201b3df6703c81ea114f2a25643c4a9ee40bb6b4c6d48f217345076899a9259af9fb7978a8f9936f9aa1053829e6606a7c3752835cf5f61a304e16b6c09117cc123570405f7becdf4e4e6104eb32e59b6847927df230a562bca90c41e697185bfba0bc3cadddd0d8ffdc6396b6a00c908945113620c49cc9ace5af1058c36659299c06864e957b7e5d6cbf44b5e5ef3b348c46f3c5ae0be75de5b94", 0xd9, 0x2, 0x0, 0x1, r4}])

[  312.101335] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  312.108585] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
[  312.139712] CPU: 1 PID: 19079 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  312.147616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  312.156974] Call Trace:
[  312.159656]  dump_stack+0x1b2/0x281
[  312.163284]  should_fail.cold+0x10a/0x149
[  312.167419]  should_failslab+0xd6/0x130
[  312.171485]  kmem_cache_alloc+0x28e/0x3c0
[  312.175640]  getname_kernel+0x4e/0x340
[  312.179523]  kern_path+0x1b/0x40
[  312.182883]  lookup_bdev+0xc6/0x1c0
[  312.186511]  ? bd_acquire+0x440/0x440
[  312.190302]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  312.195913]  ? rcu_read_lock_sched_held+0x16c/0x1d0
[  312.200915]  blkdev_get_by_path+0x1b/0xa0
[  312.205062]  mount_bdev+0x4c/0x360
[  312.208583]  ? vxfs_try_sb_magic+0x3b0/0x3b0
[  312.212977]  mount_fs+0x92/0x2a0
[  312.216344]  vfs_kern_mount.part.0+0x5b/0x470
[  312.220838]  do_mount+0xe65/0x2a30
[  312.224373]  ? __do_page_fault+0x159/0xad0
[  312.228600]  ? retint_kernel+0x2d/0x2d
[  312.232473]  ? copy_mount_string+0x40/0x40
[  312.236694]  ? memset+0x20/0x40
[  312.239958]  ? copy_mount_options+0x1fa/0x2f0
[  312.244442]  ? copy_mnt_ns+0xa30/0xa30
[  312.248448]  SyS_mount+0xa8/0x120
[  312.251916]  ? copy_mnt_ns+0xa30/0xa30
[  312.255795]  do_syscall_64+0x1d5/0x640
[  312.259695]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  312.264871] RIP: 0033:0x7faf49cac73a
[  312.268577] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  312.276269] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  312.283530] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  312.290786] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  312.298042] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
12:09:18 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r0, &(0x7f00000000c0)="8a6f49b67123653f86bc423ec572e264b7264044579f07dddd0477f6dd41d893020ee53e49ebbf2f209bb707bd02e1c4f8a26f43e60480e580f58a121bbefddd04f7bc5f6a3015e7a2d4299034903da6b2c7bc277437ab8fa14a8dcc743ae6b90cf26849358c9f8de25169e288f01b0181d2eac069f0b915492418f647904022860fb8ca9dc6daaf809a", 0x8a, 0xe84, &(0x7f0000000000)={0x77359400})

[  312.305301] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
12:09:18 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_timedsend(r0, &(0x7f00000000c0)="8a6f49b67123653f86bc423ec572e264b7264044579f07dddd0477f6dd41d893020ee53e49ebbf2f209bb707bd02e1c4f8a26f43e60480e580f58a121bbefddd04f7bc5f6a3015e7a2d4299034903da6b2c7bc277437ab8fa14a8dcc743ae6b90cf26849358c9f8de25169e288f01b0181d2eac069f0b915492418f647904022860fb8ca9dc6daaf809a", 0x8a, 0xe84, &(0x7f0000000000)={0x77359400})
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)
mq_timedsend(r0, &(0x7f00000000c0)="8a6f49b67123653f86bc423ec572e264b7264044579f07dddd0477f6dd41d893020ee53e49ebbf2f209bb707bd02e1c4f8a26f43e60480e580f58a121bbefddd04f7bc5f6a3015e7a2d4299034903da6b2c7bc277437ab8fa14a8dcc743ae6b90cf26849358c9f8de25169e288f01b0181d2eac069f0b915492418f647904022860fb8ca9dc6daaf809a", 0x8a, 0xe84, &(0x7f0000000000)={0x77359400}) (async)

12:09:18 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 48)

[  312.430811] FAULT_INJECTION: forcing a failure.
[  312.430811] name failslab, interval 1, probability 0, space 0, times 0
[  312.443289] CPU: 1 PID: 19118 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  312.451179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  312.460538] Call Trace:
[  312.463130]  dump_stack+0x1b2/0x281
[  312.466764]  should_fail.cold+0x10a/0x149
[  312.470916]  should_failslab+0xd6/0x130
[  312.474896]  kmem_cache_alloc+0x28e/0x3c0
[  312.479048]  getname_flags+0xc8/0x550
[  312.482851]  ? __do_page_fault+0x159/0xad0
[  312.487086]  user_path_at_empty+0x2a/0x50
[  312.491227]  do_mount+0x118/0x2a30
[  312.494764]  ? __do_page_fault+0x159/0xad0
[  312.499039]  ? retint_kernel+0x2d/0x2d
[  312.502914]  ? copy_mount_string+0x40/0x40
[  312.507130]  ? memset+0x20/0x40
[  312.510473]  ? copy_mount_options+0x1fa/0x2f0
[  312.514966]  ? copy_mnt_ns+0xa30/0xa30
[  312.518840]  SyS_mount+0xa8/0x120
[  312.522293]  ? copy_mnt_ns+0xa30/0xa30
[  312.526164]  do_syscall_64+0x1d5/0x640
[  312.530043]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  312.535227] RIP: 0033:0x7f5c30cef73a
[  312.539015] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  312.546706] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cef73a
[  312.553961] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007f5c2f662fe0
[  312.561215] RBP: 00007f5c2f663020 R08: 00007f5c2f663020 R09: 00000000200059c0
[  312.568468] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  312.575721] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
12:09:19 executing program 1:
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000000)={0x1, 0xff}, 0x2)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async)
write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000000)={0x1, 0xff}, 0x2) (async)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') (async)
preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0) (async)

12:09:19 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16040, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0) (async)
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, <r2=>r0, {0x3, 0x3f}}, './file0\x00'}) (async, rerun: 64)
r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='tasks\x00', 0x2, 0x0) (async, rerun: 64)
r4 = eventfd2(0x80, 0x80000)
io_submit(r1, 0x5, &(0x7f00000006c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x5501, r0, &(0x7f0000000180)="15dd4b03fce757c5002b22917c75a78df76fbe949325cf4d0834b2ec50086b91877a86bf419ded53df5f6d42dc8db78b6d7be7416d7797e1a304dc0c2dfbab2238372ae859bd94f6d16b0e2c76e45d71cc6729b6a2fd09f551192bd132b60f3cfac7ee8d36b908d762155886b1a9850c6af6a8c2e7c7ce0456539db184172331c6ea4f02b502bc436a09fa7d4f655f83a9fe901497c185a620e2674dfdddce8d1f7981478aca5341", 0xa8, 0x3f, 0x0, 0x3}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000240)="0fece7bfd5c1cf6bbe2fc758bd4e451f0ed75d2c718ffcfb926cbcae21cca05eaeaad001396eaaab15f8d52b9d744a3045201cc705c0d094a7a29fea6e34b7821c31c4725b21c2ecc665b1cf4e8c45e6b258ae15437a3bdeed0adff02f6c8b1f4775b868ed36eb4b4173f0ed22b824d57b83e39f80cdad103c133da1a02d120f988915ed70c72a2fcba1a51dccf90c81335721a589ec24c8b80a67c9e7e75b15bfe81e4dab717222beed9b8c54aa1d5e91d3bc0da7177c75d24ad39f7c2554", 0xbf, 0xffffffff}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x1, r0, &(0x7f0000000300)="5709b2a3229b012abbd86d050aa3e730465429aad75fdd6e522b3fb57a281bd94197f64c45372e84cf13b75c66dfbec2a05d23b890c0d8af459968672c47edc946492178e2ba453ee9cf156f754307bc02ed0b5d89110956a6e4a9797dd01c3f2d55c5bde8e158c6369b540eec1a81d9afa4e28fe2c576f588f6fd0b661a4fcfcf86c002093782e2", 0x88, 0x1, 0x0, 0x5, r2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000400)="0cb3edd77c885250449522503c8a3662777c534c16614a62870ef9c91b1a0ef1ba66a1549423c6ce3046dd43a5c528eae9e4f1b832c20b8170770262e05b1d3c3254eb5826088dc9c65461eb79be8e6fc14e0ef02ac4a38f0a5b08dcfe66c3003b2048fe408e95d41bd357a705179e82b0a7620c2ebc58ddbdfd3529ec3eb34c65e3b207c91e00bc03db3be560efda42281e6cda2f0cac1a4970d1de17764f68a94428da8e7274d395450dca553396e67ba9c9a3a64f03913ab2c7af6333a212043c45ed4419b7062326ff87a2756088ec8f5c71e756bfb365e5b4fb14fb608b773861f05d844428d9d7d6910b9ffc6e5478f642", 0xf4, 0xfffffffffffffff8}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000580)="5a83931867b901041d99204523e27db9a8b483b53fe3c6fb212f883cef3986b74e9389b518e8e6d7857045634f209d542d84a97a5dd1f08606f4677d7aa201b3df6703c81ea114f2a25643c4a9ee40bb6b4c6d48f217345076899a9259af9fb7978a8f9936f9aa1053829e6606a7c3752835cf5f61a304e16b6c09117cc123570405f7becdf4e4e6104eb32e59b6847927df230a562bca90c41e697185bfba0bc3cadddd0d8ffdc6396b6a00c908945113620c49cc9ace5af1058c36659299c06864e957b7e5d6cbf44b5e5ef3b348c46f3c5ae0be75de5b94", 0xd9, 0x2, 0x0, 0x1, r4}])

12:09:19 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 54)

12:09:19 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, <r1=>r0, {0x3, 0x8}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'})
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:09:19 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2)
close(r0)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:19 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 49)

[  312.829894] FAULT_INJECTION: forcing a failure.
[  312.829894] name failslab, interval 1, probability 0, space 0, times 0
[  312.860178] FAULT_INJECTION: forcing a failure.
[  312.860178] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  312.860446] CPU: 0 PID: 19139 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  312.879995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  312.889335] Call Trace:
[  312.891917]  dump_stack+0x1b2/0x281
[  312.895530]  should_fail.cold+0x10a/0x149
[  312.899663]  should_failslab+0xd6/0x130
[  312.903620]  kmem_cache_alloc_trace+0x29a/0x3d0
[  312.908272]  ? set_bdev_super+0x110/0x110
[  312.912399]  sget_userns+0x102/0xc10
[  312.916107]  ? set_bdev_super+0x110/0x110
[  312.920240]  ? ns_test_super+0x50/0x50
[  312.924110]  ? set_bdev_super+0x110/0x110
[  312.928238]  ? ns_test_super+0x50/0x50
[  312.932106]  sget+0xd1/0x110
[  312.935133]  mount_bdev+0xcd/0x360
[  312.938672]  ? vxfs_try_sb_magic+0x3b0/0x3b0
[  312.943072]  mount_fs+0x92/0x2a0
[  312.946428]  vfs_kern_mount.part.0+0x5b/0x470
[  312.950921]  do_mount+0xe65/0x2a30
[  312.954454]  ? __do_page_fault+0x159/0xad0
[  312.958674]  ? retint_kernel+0x2d/0x2d
[  312.962547]  ? copy_mount_string+0x40/0x40
[  312.966771]  ? memset+0x20/0x40
[  312.970038]  ? copy_mount_options+0x1fa/0x2f0
[  312.974600]  ? copy_mnt_ns+0xa30/0xa30
[  312.978468]  SyS_mount+0xa8/0x120
[  312.981902]  ? copy_mnt_ns+0xa30/0xa30
[  312.985771]  do_syscall_64+0x1d5/0x640
[  312.989643]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  312.994816] RIP: 0033:0x7faf49cac73a
[  312.998510] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  313.006199] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  313.013454] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  313.020705] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  313.027981] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  313.035230] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  313.042499] CPU: 1 PID: 19149 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  313.050401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  313.059750] Call Trace:
[  313.062342]  dump_stack+0x1b2/0x281
[  313.066061]  should_fail.cold+0x10a/0x149
[  313.070217]  __alloc_pages_nodemask+0x22c/0x2720
[  313.074973]  ? __save_stack_trace+0x63/0x160
[  313.079388]  ? __lock_acquire+0x5fc/0x3f20
[  313.083629]  ? cmp_ex_sort+0xb0/0xb0
[  313.087347]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  313.092190]  ? search_extable+0x6f/0x80
[  313.096160]  ? trim_init_extable+0x280/0x280
[  313.100566]  ? copy_mount_options+0x194/0x2f0
[  313.105066]  ? perf_trace_lock+0xf7/0x490
[  313.109217]  ? perf_trace_lock_acquire+0x510/0x510
[  313.114148]  ? force_sig_info_fault.constprop.0+0x260/0x260
[  313.119848]  ? bad_area_access_error+0x1f8/0x3e0
[  313.124591]  cache_grow_begin+0x91/0x700
[  313.128637]  ? fs_reclaim_release+0xd0/0x110
[  313.133060]  ? check_preemption_disabled+0x35/0x240
[  313.138068]  cache_alloc_refill+0x273/0x350
[  313.142375]  kmem_cache_alloc+0x333/0x3c0
[  313.146519]  getname_flags+0xc8/0x550
[  313.150310]  ? __do_page_fault+0x159/0xad0
[  313.154534]  user_path_at_empty+0x2a/0x50
[  313.158670]  do_mount+0x118/0x2a30
[  313.162204]  ? __do_page_fault+0x159/0xad0
[  313.166417]  ? retint_kernel+0x2d/0x2d
[  313.170283]  ? copy_mount_string+0x40/0x40
[  313.174513]  ? memset+0x20/0x40
[  313.177781]  ? copy_mount_options+0x1fa/0x2f0
[  313.182352]  ? copy_mnt_ns+0xa30/0xa30
[  313.186221]  SyS_mount+0xa8/0x120
[  313.189664]  ? copy_mnt_ns+0xa30/0xa30
[  313.193563]  do_syscall_64+0x1d5/0x640
[  313.197446]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  313.202617] RIP: 0033:0x7f5c30cef73a
[  313.206307] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  313.214005] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cef73a
[  313.221264] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007f5c2f662fe0
12:09:19 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, <r1=>r0, {0x3, 0x8}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:09:19 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 55)

12:09:19 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) (async)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2)
close(r0) (async)
r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2)

12:09:19 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16040, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, <r2=>r0, {0x3, 0x3f}}, './file0\x00'}) (async)
r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='tasks\x00', 0x2, 0x0)
r4 = eventfd2(0x80, 0x80000)
io_submit(r1, 0x5, &(0x7f00000006c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x5501, r0, &(0x7f0000000180)="15dd4b03fce757c5002b22917c75a78df76fbe949325cf4d0834b2ec50086b91877a86bf419ded53df5f6d42dc8db78b6d7be7416d7797e1a304dc0c2dfbab2238372ae859bd94f6d16b0e2c76e45d71cc6729b6a2fd09f551192bd132b60f3cfac7ee8d36b908d762155886b1a9850c6af6a8c2e7c7ce0456539db184172331c6ea4f02b502bc436a09fa7d4f655f83a9fe901497c185a620e2674dfdddce8d1f7981478aca5341", 0xa8, 0x3f, 0x0, 0x3}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000240)="0fece7bfd5c1cf6bbe2fc758bd4e451f0ed75d2c718ffcfb926cbcae21cca05eaeaad001396eaaab15f8d52b9d744a3045201cc705c0d094a7a29fea6e34b7821c31c4725b21c2ecc665b1cf4e8c45e6b258ae15437a3bdeed0adff02f6c8b1f4775b868ed36eb4b4173f0ed22b824d57b83e39f80cdad103c133da1a02d120f988915ed70c72a2fcba1a51dccf90c81335721a589ec24c8b80a67c9e7e75b15bfe81e4dab717222beed9b8c54aa1d5e91d3bc0da7177c75d24ad39f7c2554", 0xbf, 0xffffffff}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x1, r0, &(0x7f0000000300)="5709b2a3229b012abbd86d050aa3e730465429aad75fdd6e522b3fb57a281bd94197f64c45372e84cf13b75c66dfbec2a05d23b890c0d8af459968672c47edc946492178e2ba453ee9cf156f754307bc02ed0b5d89110956a6e4a9797dd01c3f2d55c5bde8e158c6369b540eec1a81d9afa4e28fe2c576f588f6fd0b661a4fcfcf86c002093782e2", 0x88, 0x1, 0x0, 0x5, r2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000400)="0cb3edd77c885250449522503c8a3662777c534c16614a62870ef9c91b1a0ef1ba66a1549423c6ce3046dd43a5c528eae9e4f1b832c20b8170770262e05b1d3c3254eb5826088dc9c65461eb79be8e6fc14e0ef02ac4a38f0a5b08dcfe66c3003b2048fe408e95d41bd357a705179e82b0a7620c2ebc58ddbdfd3529ec3eb34c65e3b207c91e00bc03db3be560efda42281e6cda2f0cac1a4970d1de17764f68a94428da8e7274d395450dca553396e67ba9c9a3a64f03913ab2c7af6333a212043c45ed4419b7062326ff87a2756088ec8f5c71e756bfb365e5b4fb14fb608b773861f05d844428d9d7d6910b9ffc6e5478f642", 0xf4, 0xfffffffffffffff8}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000580)="5a83931867b901041d99204523e27db9a8b483b53fe3c6fb212f883cef3986b74e9389b518e8e6d7857045634f209d542d84a97a5dd1f08606f4677d7aa201b3df6703c81ea114f2a25643c4a9ee40bb6b4c6d48f217345076899a9259af9fb7978a8f9936f9aa1053829e6606a7c3752835cf5f61a304e16b6c09117cc123570405f7becdf4e4e6104eb32e59b6847927df230a562bca90c41e697185bfba0bc3cadddd0d8ffdc6396b6a00c908945113620c49cc9ace5af1058c36659299c06864e957b7e5d6cbf44b5e5ef3b348c46f3c5ae0be75de5b94", 0xd9, 0x2, 0x0, 0x1, r4}])

[  313.228563] RBP: 00007f5c2f663020 R08: 00007f5c2f663020 R09: 00000000200059c0
[  313.235815] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  313.243075] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
[  313.260060] vxfs: WRONG superblock magic 00000000 at 1
[  313.265978] vxfs: WRONG superblock magic 00000000 at 8
[  313.271521] vxfs: can't find superblock.
12:09:19 executing program 5:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, <r1=>r0, {0x3, 0x8}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

12:09:19 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 50)

[  313.374437] FAULT_INJECTION: forcing a failure.
[  313.374437] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  313.376935] FAULT_INJECTION: forcing a failure.
[  313.376935] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  313.386271] CPU: 1 PID: 19186 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  313.405925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  313.415260] Call Trace:
[  313.417844]  dump_stack+0x1b2/0x281
[  313.421459]  should_fail.cold+0x10a/0x149
[  313.425589]  __alloc_pages_nodemask+0x22c/0x2720
[  313.430335]  ? __save_stack_trace+0x63/0x160
[  313.434725]  ? is_bpf_text_address+0x91/0x150
[  313.439201]  ? __lock_acquire+0x5fc/0x3f20
[  313.443431]  ? cmp_ex_sort+0xb0/0xb0
[  313.447127]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  313.451953]  ? search_extable+0x6f/0x80
[  313.455909]  ? trim_init_extable+0x280/0x280
[  313.460295]  ? __kernel_text_address+0x9/0x30
[  313.464770]  ? copy_mount_options+0x194/0x2f0
[  313.469247]  ? fixup_exception+0x93/0xd0
[  313.473289]  ? no_context+0x9c/0x7c0
[  313.476984]  ? force_sig_info_fault.constprop.0+0x260/0x260
[  313.482684]  ? bad_area_access_error+0x1f8/0x3e0
[  313.487421]  cache_grow_begin+0x91/0x700
[  313.491507]  ? fs_reclaim_release+0xd0/0x110
[  313.495896]  ? check_preemption_disabled+0x35/0x240
[  313.500993]  cache_alloc_refill+0x273/0x350
[  313.505299]  kmem_cache_alloc+0x333/0x3c0
[  313.509515]  getname_flags+0xc8/0x550
[  313.513302]  ? __do_page_fault+0x159/0xad0
[  313.517516]  user_path_at_empty+0x2a/0x50
[  313.521643]  do_mount+0x118/0x2a30
[  313.525171]  ? __do_page_fault+0x159/0xad0
[  313.529385]  ? retint_kernel+0x2d/0x2d
[  313.533339]  ? copy_mount_string+0x40/0x40
[  313.537559]  ? memset+0x20/0x40
[  313.540820]  ? copy_mount_options+0x1fa/0x2f0
[  313.545293]  ? copy_mnt_ns+0xa30/0xa30
[  313.549160]  SyS_mount+0xa8/0x120
[  313.552605]  ? copy_mnt_ns+0xa30/0xa30
[  313.556487]  do_syscall_64+0x1d5/0x640
[  313.560358]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  313.565614] RIP: 0033:0x7f5c30cef73a
[  313.569302] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  313.576990] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cef73a
[  313.584240] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007f5c2f662fe0
[  313.591488] RBP: 00007f5c2f663020 R08: 00007f5c2f663020 R09: 00000000200059c0
[  313.598743] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  313.605993] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
[  313.613258] CPU: 0 PID: 19180 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  313.614767] vxfs: WRONG superblock magic 00000000 at 1
[  313.621130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  313.621135] Call Trace:
[  313.621150]  dump_stack+0x1b2/0x281
[  313.621164]  should_fail.cold+0x10a/0x149
[  313.621175]  ? get_page_from_freelist+0xaf6/0x25a0
[  313.621186]  __alloc_pages_nodemask+0x22c/0x2720
[  313.621197]  ? lock_downgrade+0x740/0x740
[  313.621207]  ? page_outside_zone_boundaries+0x1db/0x310
[  313.621217]  ? __lock_acquire+0x5fc/0x3f20
[  313.621228]  ? preempt_count_add+0xaf/0x170
[  313.621239]  ? gfp_pfmemalloc_allowed+0x150/0x150
[  313.626844] vxfs: WRONG superblock magic 00000000 at 8
[  313.635854]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  313.635867]  ? rcu_read_lock_sched_held+0x16c/0x1d0
[  313.635877]  ? __alloc_pages_nodemask+0x1a6e/0x2720
[  313.635890]  cache_grow_begin+0x91/0x700
[  313.635897]  ? fs_reclaim_release+0xd0/0x110
[  313.635907]  ? check_preemption_disabled+0x35/0x240
[  313.635918]  cache_alloc_refill+0x273/0x350
[  313.635936]  kmem_cache_alloc+0x333/0x3c0
[  313.638629] vxfs: can't find superblock.
[  313.642104]  getname_kernel+0x4e/0x340
[  313.642116]  kern_path+0x1b/0x40
[  313.642128]  lookup_bdev+0xc6/0x1c0
[  313.642138]  ? bd_acquire+0x440/0x440
[  313.642147]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  313.642157]  ? rcu_read_lock_sched_held+0x16c/0x1d0
[  313.642168]  blkdev_get_by_path+0x1b/0xa0
[  313.642177]  mount_bdev+0x4c/0x360
[  313.758250]  ? vxfs_try_sb_magic+0x3b0/0x3b0
[  313.762675]  mount_fs+0x92/0x2a0
[  313.766034]  vfs_kern_mount.part.0+0x5b/0x470
[  313.770510]  do_mount+0xe65/0x2a30
[  313.774039]  ? __do_page_fault+0x159/0xad0
[  313.778255]  ? retint_kernel+0x2d/0x2d
[  313.782124]  ? copy_mount_string+0x40/0x40
[  313.786345]  ? memset+0x20/0x40
[  313.789606]  ? copy_mount_options+0x1fa/0x2f0
[  313.794103]  ? copy_mnt_ns+0xa30/0xa30
[  313.797980]  SyS_mount+0xa8/0x120
[  313.801426]  ? copy_mnt_ns+0xa30/0xa30
[  313.805301]  do_syscall_64+0x1d5/0x640
[  313.809187]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  313.814371] RIP: 0033:0x7faf49cac73a
[  313.818070] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
12:09:20 executing program 1:
r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
lseek(r0, 0x7, 0x0)
preadv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1, 0x0, 0x0)

[  313.825762] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  313.833016] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  313.840280] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  313.847552] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  313.854805] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  313.863672] vxfs: WRONG superblock magic 00000000 at 1
[  313.869165] vxfs: WRONG superblock magic 00000000 at 8
12:09:20 executing program 5:
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)

[  313.880416] vxfs: can't find superblock.
12:09:20 executing program 2:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x3, &(0x7f0000005f80)=[{&(0x7f0000005a40)}, {0x0}, {0x0}], 0x8, &(0x7f0000006080)={[{}, {'\xe8\\+&'}], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, '[^#\\]^$'}}, {@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 51)

12:09:20 executing program 4:
syz_mount_image$vxfs(&(0x7f00000059c0), &(0x7f0000005a00)='./file0\x00', 0x0, 0x1, &(0x7f0000005f80)=[{0x0}], 0x8, &(0x7f0000006080)={[{'/!,*+:$}.*/\'\xa1((-!.\'\b\'-+@^-.-$'}], [{@subj_role={'subj_role', 0x3d, '\x96&+'}}]}) (fail_nth: 56)

12:09:20 executing program 5:
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  313.996681] FAULT_INJECTION: forcing a failure.
[  313.996681] name failslab, interval 1, probability 0, space 0, times 0
[  314.002981] FAULT_INJECTION: forcing a failure.
[  314.002981] name failslab, interval 1, probability 0, space 0, times 0
[  314.008673] CPU: 0 PID: 19211 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  314.027195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  314.036540] Call Trace:
[  314.039120]  dump_stack+0x1b2/0x281
[  314.042729]  should_fail.cold+0x10a/0x149
[  314.046859]  should_failslab+0xd6/0x130
[  314.050820]  __kmalloc+0x2c1/0x400
[  314.054344]  ? register_shrinker+0x1ab/0x220
[  314.058734]  register_shrinker+0x1ab/0x220
[  314.062949]  sget_userns+0x9aa/0xc10
[  314.066644]  ? set_bdev_super+0x110/0x110
[  314.070776]  ? ns_test_super+0x50/0x50
[  314.074645]  ? set_bdev_super+0x110/0x110
[  314.078771]  ? ns_test_super+0x50/0x50
[  314.082636]  sget+0xd1/0x110
[  314.085636]  mount_bdev+0xcd/0x360
[  314.089164]  ? vxfs_try_sb_magic+0x3b0/0x3b0
[  314.093564]  mount_fs+0x92/0x2a0
[  314.096922]  vfs_kern_mount.part.0+0x5b/0x470
[  314.101416]  do_mount+0xe65/0x2a30
[  314.104950]  ? __do_page_fault+0x159/0xad0
[  314.109166]  ? retint_kernel+0x2d/0x2d
[  314.113039]  ? copy_mount_string+0x40/0x40
[  314.117276]  ? memset+0x20/0x40
[  314.120555]  ? copy_mount_options+0x1fa/0x2f0
[  314.125032]  ? copy_mnt_ns+0xa30/0xa30
[  314.128901]  SyS_mount+0xa8/0x120
[  314.132333]  ? copy_mnt_ns+0xa30/0xa30
[  314.136202]  do_syscall_64+0x1d5/0x640
[  314.140071]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  314.145243] RIP: 0033:0x7faf49cac73a
[  314.148933] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  314.156630] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  314.163883] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  314.171141] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  314.178419] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  314.185676] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  314.192944] CPU: 1 PID: 19208 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0
[  314.200824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  314.210169] Call Trace:
[  314.212756]  dump_stack+0x1b2/0x281
[  314.216383]  should_fail.cold+0x10a/0x149
[  314.220538]  should_failslab+0xd6/0x130
[  314.224514]  __kmalloc_track_caller+0x2bc/0x400
[  314.229182]  ? kstrdup_const+0x35/0x60
[  314.233070]  ? lock_downgrade+0x740/0x740
[  314.237217]  kstrdup+0x36/0x70
[  314.240416]  kstrdup_const+0x35/0x60
[  314.244128]  alloc_vfsmnt+0xe0/0x7f0
[  314.247838]  ? _raw_read_unlock+0x29/0x40
[  314.251987]  vfs_kern_mount.part.0+0x27/0x470
[  314.256488]  do_mount+0xe65/0x2a30
[  314.256816] ------------[ cut here ]------------
[  314.260051]  ? __do_page_fault+0x159/0xad0
[  314.264788] WARNING: CPU: 0 PID: 19211 at fs/super.c:1163 kill_block_super+0xbe/0xe0
[  314.268994]  ? retint_kernel+0x2d/0x2d
[  314.276848] Kernel panic - not syncing: panic_on_warn set ...
[  314.276848] 
[  314.280721]  ? copy_mount_string+0x40/0x40
[  314.292271]  ? memset+0x20/0x40
[  314.295625]  ? copy_mount_options+0x1fa/0x2f0
[  314.300102]  ? copy_mnt_ns+0xa30/0xa30
[  314.303971]  SyS_mount+0xa8/0x120
[  314.307417]  ? copy_mnt_ns+0xa30/0xa30
[  314.311302]  do_syscall_64+0x1d5/0x640
[  314.315191]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  314.320366] RIP: 0033:0x7f5c30cef73a
[  314.324062] RSP: 002b:00007f5c2f662f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  314.331756] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007f5c30cef73a
[  314.339006] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007f5c2f662fe0
12:09:20 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x3f, &(0x7f0000000140)=<r1=>0x0)
io_cancel(r1, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0}, 0x0)
r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0)
io_setup(0x1, &(0x7f0000000240)=<r3=>0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc020660b, &(0x7f0000000140))
r5 = syz_mount_image$jffs2(&(0x7f0000000740), &(0x7f0000000780)='./file0\x00', 0x7, 0x1, &(0x7f0000000800)=[{&(0x7f00000007c0)="a7a7edc31271", 0x6, 0xbb}], 0x8c1400, &(0x7f0000000840)={[{@compr_lzo}], [{@obj_role={'obj_role', 0x3d, '/dev/userio\x00'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@dont_measure}, {@smackfsfloor={'smackfsfloor', 0x3d, 'uid'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]})
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0xc020660b, &(0x7f0000000140))
r7 = syz_mount_image$gfs2meta(&(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0x0, 0x2, &(0x7f0000000b00)=[{&(0x7f0000000a80)="a61a11b2cb83abb003eff61a1e9897e6d246", 0x12, 0x6}, {&(0x7f0000000ac0)="a8d46ec2d839fcd41a6a47c8a1", 0xd, 0x2}], 0x2020041, &(0x7f0000000b40)={[{}, {'g!'}, {'+'}, {'fscontext'}, {'dont_measure'}, {',,-@'}], [{@fsname={'fsname', 0x3d, '\\{*%&'}}, {@smackfsroot}, {@smackfsdef={'smackfsdef', 0x3d, '^&[[:,'}}, {@euid_lt={'euid<', 0xee01}}, {@fsname={'fsname', 0x3d, 'unconfined_u'}}, {@smackfshat={'smackfshat', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]})
io_submit(r3, 0x6, &(0x7f0000004340)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x2, 0x19, r2, &(0x7f0000000000)="98", 0x1, 0x0, 0x0, 0x0, r4}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x8, 0xcac1, r5, &(0x7f00000008c0)="e052aaac73e57973e68e1c15dd7afdce5636783d6c15291ab5274837bcb0b4021050178aa3b4bfeb1390d051c554ef7330d4d5001e157d23face75179be1fccf1bc47b7bb361243207644c171e8243784016b9e5a4aa846049515f5838cbe273c83d9f2b43b727bf34ee41e8c58c1423f56d2ce356e0c1fa0bdc4350741ab663b300b442f0fb781951dc0c95d2314a5fd84b27b5b4ed74763173dd65958ca020681321c5e39d8a0570cb021d5093641d0c1218458b93136c7930560f8230e4c8c2d7bd42c8fc432c2b1d3e", 0xcb, 0x401, 0x0, 0x1, r6}, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x1, 0x400, r7, &(0x7f0000000c00)="70590eadb63a554f483b9bd1c23e5604a4f6d3a9a75161443261f4bdaa4e2d3d5fceaaccea6ea4e7e00a0e022aba31f9cd9e3734402ca71e0844019f2b9b01b75bb394e79f861aa0a711faae109f4167b84718b408dbf9bb1549fb1161d72a429a8f2979266c6c475edc499296d3fca674a63669ba3b", 0x76, 0x7fffffff, 0x0, 0x2}, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x7, 0x8, 0xffffffffffffffff, &(0x7f0000002240)="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", 0x1000, 0x5, 0x0, 0x3}, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x3, 0xff, 0xffffffffffffffff, &(0x7f0000000d40)="fba3b6c951bb96203bf1e57f88dfe69b46bc37c8cfd066e013bae25c980e23491207c1d60ef4e49b6b7c776e090fb7f90e570cf49545b6580f9f99552f5646510d269e549b6a805bb168818afd106592eb4db0adb24b5b8628341e809285d8f0d0452ca1907b1c736b5e6a909d7c8bd98660c8d2f0e4822ac9e14617451df351187500e1a0", 0x85, 0xea2}, &(0x7f0000004300)={0x0, 0x0, 0x0, 0x0, 0x72d, 0xffffffffffffffff, &(0x7f00000011c0)="bbedce4cd489fd9169db531a98024d3cba", 0x11, 0x40, 0x0, 0x2}])
r8 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100), 0x2000000000040406, 0x0)
write$USERIO_CMD_SET_PORT_TYPE(r8, &(0x7f0000000380)={0x1, 0x6}, 0x2)
write$USERIO_CMD_REGISTER(r8, &(0x7f0000000040), 0x2)
r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x6}, 0x10)
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc020660b, &(0x7f0000000140))
pipe2(&(0x7f0000000680)={0xffffffffffffffff, <r11=>0xffffffffffffffff}, 0x80)
io_submit(r3, 0x7, &(0x7f0000000700)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r8, &(0x7f0000000180)="74aa7d95aeb44a937b7ee16cb4aef42d07f56ab89200eac00e6c8c66843fc3aa95d02ee10b8c19b341740a4d72fb726e66712996c87457761a85632e84db347ee5e09e416fbf1d2f3dab2c769d3091220e6a5c9e554587501067147bb285f89122338452105d2ef5123da0f7f49cf9b31224a5aa3731a189a2149f7ef5a313ff2d67b50f0e80a79a4ce4a221ce08ed91af0da558697d9a020f77904c1635897df7c14ee9832455874fa0ccdfdb33", 0xae, 0xfff0000000000000, 0x0, 0x2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0xf173, r0, &(0x7f00000000c0)="020ae1da3a3f7d1af4dabade03e2ccfa03b0a861396132dea7578c1b85249106db98cb68f4ae42b5f005dd0c550869d32aa3204be830bab2ead8cce9a07ffbdb8bc7b899c7d8f921645b77e8874bbc8a78c2a9ae7c33f51d6a8f0eeb", 0x5c, 0x10000, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8, 0xffff, r0, &(0x7f0000001240)="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", 0x1000, 0x30e, 0x0, 0x2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x5, 0x0, r9, &(0x7f0000000300)="a3fccaccddd2f83c596f14cc8708ec188e877c0775e4d55e4a97305f3ed943e01a0a38d880e323a8c4e180fd3c1f340696496634a261e17ddb99046b45b59714ffbefc5179487c9a509d1cb67fd8392a6a3196b65a9c6f9c36478927942215a031c7dda8d1c5cb2b7267b84b16922a0370601a19fba3f499ada0d04aff22ef5a609fcf0440cef19e07cb624bc731935b89285149fb2d4522aef93bc3a9500b8b4fad865e71bea435991cc8bb6fa6d0e0d6bd8641fc71ff6888734b4233962e016986c611da88e780306b3e5b5ef2cb865f656b1f59f9b440134ba903c9acf9ceb7c4fcf9575454", 0xe7, 0x9, 0x0, 0x2}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x1f, r0, &(0x7f0000000440)="b17358f2042d30b630a4b0698922b1b21b64c98dc2932436039423f923a747fb2c3f88ea67f88c5f3b6d12bad20cd1c2c2a97304273820f13bc48d033b1d49973cabfc430ab905136039d4805966344d372a826a4366f43e1df9e5a8e575db1b646bb8b05be3efe0f462fa9292a74eeee8cc440894a9e6dbc1b0e4ac27330de822c9936c0c5c06919ced230d83efc838b032981b4cb186b0a29275b522259bbe9192b394a53bddd3d8be2ea55735164d7392385be0016ce0734c642202c7fbc4f8e3d9e6ac44a44eb664e1e31a34d62e7b02a8067a2414fc2dce0a49c66050e0c92a5d", 0xe3, 0x9, 0x0, 0x1}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x1, 0x1f, r0, &(0x7f0000000580)="b4314f1033d361ae362a42ef5d071d19f876f942559d6ba15710b71c888b68e7e4cc0a7960243aad5e3176faeb438a89ff461bbb73401bc7ada688b022678ace08fb1c9079056c58d7410eff79c75bfc61db182296741a9aa2a4cd", 0x5b, 0x3, 0x0, 0x2, r10}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x5, 0x2, r0, &(0x7f0000000640)="99694a0e0e2546353c294a80f882644b9b4adc00bf265fb7a42110407f", 0x1d, 0xdc0, 0x0, 0x1, r11}])

12:09:20 executing program 5:
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0)
mq_open(&(0x7f0000006180)='}!\x00', 0x40, 0x0, 0x0) (async)

[  314.346253] RBP: 00007f5c2f663020 R08: 00007f5c2f663020 R09: 00000000200059c0
[  314.353503] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  314.360753] R13: 0000000020005a00 R14: 00007f5c2f662fe0 R15: 0000000020006080
[  314.368107] CPU: 0 PID: 19211 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0
[  314.375986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[  314.385336] Call Trace:
[  314.387927]  dump_stack+0x1b2/0x281
[  314.391561]  panic+0x1f9/0x42d
[  314.394750]  ? add_taint.cold+0x16/0x16
[  314.398722]  ? kill_block_super+0xbe/0xe0
[  314.402866]  ? __warn.cold+0x5/0x44
[  314.406584]  ? kill_block_super+0xbe/0xe0
[  314.410726]  __warn.cold+0x20/0x44
[  314.414258]  ? ist_end_non_atomic+0x10/0x10
[  314.418575]  ? kill_block_super+0xbe/0xe0
[  314.422719]  report_bug+0x208/0x250
[  314.426346]  do_error_trap+0x195/0x2d0
[  314.430238]  ? math_error+0x2d0/0x2d0
[  314.434025]  ? retint_kernel+0x2d/0x2d
[  314.437894]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  314.442735]  invalid_op+0x1b/0x40
[  314.446172] RIP: 0010:kill_block_super+0xbe/0xe0
[  314.450899] RSP: 0018:ffff888056127bc8 EFLAGS: 00010246
[  314.456254] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc900063ea000
[  314.463503] RDX: 0000000000040000 RSI: ffffffff818761be RDI: ffff88808ff29770
[  314.470750] RBP: ffff888054834340 R08: ffffffff8b9cfb80 R09: 0000000000000001
[  314.477996] R10: 0000000000000000 R11: ffff888049de2200 R12: ffff88808ff292c0
[  314.485239] R13: ffffffff890c6230 R14: ffffffff88f45760 R15: dffffc0000000000
[  314.492502]  ? kill_block_super+0xbe/0xe0
[  314.496642]  ? kill_block_super+0xbe/0xe0
[  314.500776]  deactivate_locked_super+0x6c/0xd0
[  314.505342]  sget_userns+0x9c4/0xc10
[  314.509041]  ? set_bdev_super+0x110/0x110
[  314.513173]  ? ns_test_super+0x50/0x50
[  314.517053]  ? set_bdev_super+0x110/0x110
[  314.521176]  ? ns_test_super+0x50/0x50
[  314.525038]  sget+0xd1/0x110
[  314.528038]  mount_bdev+0xcd/0x360
[  314.531556]  ? vxfs_try_sb_magic+0x3b0/0x3b0
[  314.535948]  mount_fs+0x92/0x2a0
[  314.539294]  vfs_kern_mount.part.0+0x5b/0x470
[  314.543767]  do_mount+0xe65/0x2a30
[  314.547307]  ? __do_page_fault+0x159/0xad0
[  314.551524]  ? retint_kernel+0x2d/0x2d
[  314.555396]  ? copy_mount_string+0x40/0x40
[  314.559606]  ? memset+0x20/0x40
[  314.562861]  ? copy_mount_options+0x1fa/0x2f0
[  314.567333]  ? copy_mnt_ns+0xa30/0xa30
[  314.571195]  SyS_mount+0xa8/0x120
[  314.574623]  ? copy_mnt_ns+0xa30/0xa30
[  314.578490]  do_syscall_64+0x1d5/0x640
[  314.582357]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  314.587522] RIP: 0033:0x7faf49cac73a
[  314.591208] RSP: 002b:00007faf4861ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  314.598892] RAX: ffffffffffffffda RBX: 0000000020005f80 RCX: 00007faf49cac73a
[  314.606147] RDX: 00000000200059c0 RSI: 0000000020005a00 RDI: 00007faf4861ffe0
[  314.613500] RBP: 00007faf48620020 R08: 00007faf48620020 R09: 00000000200059c0
[  314.620760] R10: 0000000000000008 R11: 0000000000000206 R12: 00000000200059c0
[  314.628009] R13: 0000000020005a00 R14: 00007faf4861ffe0 R15: 0000000020006080
[  314.635908] Kernel Offset: disabled
[  314.639606] Rebooting in 86400 seconds..